Case ID
T-Mobile 2021: $500M+, the repeat-offender precedent.
T-Mobile disclosed on 16 August 2021 that an attacker had breached an internal testing environment and exfiltrated customer data for 77 million current, former, and prospective subscribers. The class-action settlement at $350M was the largest class-action breach settlement at the time and included an unusual $150M mandatory security investment commitment over two years. The case established the "repeat-offender" framework that the FCC and state regulators have since applied to subsequent telecom breaches.
Records exposed
77M
Subscribers and prospects
Total cost
$500M+
Cumulative disclosed
Class settlement
$350M
Largest at the time
Security investment
$150M
Mandated two-year commitment
Section TMO.1
The testing-environment compromise
The attacker, John Erin Binns (a 21-year-old American living in Turkey), gained access to T-Mobile's network in July 2021 through what he later described in interviews as a brute-force attack against a specific testing environment. The testing environment held production-scale subscriber data for purposes of load testing and integration testing, a practice that was common across the telecom industry but that this breach made indefensible. With access to the testing environment, Binns enumerated subscriber records and exfiltrated 77 million records over the following weeks before T-Mobile detected the unusual traffic.
Exposed data included names, dates of birth, SSNs, driver-licence numbers, IMEI device identifiers, and IMSI subscriber identifiers. The SSN and driver-licence exposure made the breach unusually high-value to identity-theft markets. Binns publicly announced the breach on an underground forum and offered the data for sale at approximately $270,000 in Bitcoin, with sample data subsequently appearing on the dark web.
The testing-environment compromise highlighted the industry-wide practice of using production data in non-production environments. Post-T-Mobile, the regulatory and audit expectation has shifted decisively toward synthetic data or data minimisation for testing purposes. The cost economics support the shift: data-minimisation tooling for testing environments runs $50K-$500K annually for an enterprise estate, against the $500M+ exposure that production-data testing can produce in a single incident.
Section TMO.2
The $500M+ cost composition
| Cost line item | Amount | Source |
|---|---|---|
| Class-action settlement (consolidated) | $350M | Western District of Missouri, In re T-Mobile Customer Data Security Breach Litigation, 2022 |
| Mandatory security investment commitment | $150M over 2 years | Class-action settlement terms 2022 |
| FCC settlement (2024 wave including multiple breaches) | $15.75M civil penalty | FCC consent decree 30 September 2024 |
| Direct response and remediation | ~$50M | T-Mobile SEC 10-K filings 2021-2023 |
| Credit monitoring and identity protection (2 years) | ~$30M | Settlement administration figures, McKool Smith allocation |
| Total cumulative cost | $500M+ | T-Mobile SEC 10-K filings 2021-2024 |
The $150M security-investment commitment is included in total cost despite being structured as a forward-looking obligation rather than a cash settlement. The commitment was court-supervised and required quarterly reporting to demonstrate compliance.
Section TMO.3
The $350M class-action settlement structure
The consolidated class-action in the Western District of Missouri settled for $350M in July 2022 and received final approval in June 2023. The settlement structure provided two years of credit monitoring and identity-protection through Kroll worth approximately $30 per class member at retail pricing, up to $25,000 per class member in documented out-of-pocket cost reimbursement, alternative cash payment of $25 per class member who did not enrol in credit monitoring, and approximately $79M in attorney fees.
The novel element was the $150M forward-looking security-investment commitment. T-Mobile agreed to spend an additional $150M on cybersecurity above the company's pre-breach planned investment over the two years following settlement, with court-supervised reporting to demonstrate compliance. The investment commitment was specifically allocated to incident detection, identity-and-access management, data-loss-prevention tooling, and security-operations-centre staffing. The structure has since been adopted in subsequent telecom breach settlements as a way of providing class-action plaintiffs with assurance that the conditions producing the breach have actually been remediated.
Per-class-member effective compensation excluding the security-investment component was approximately $4.55 (across the 77M class members), in the same range as comparable mega-breach settlements. The credit-monitoring component dominated the per-class value as has been typical.
Section TMO.4
The repeat-offender framework that T-Mobile triggered
T-Mobile had been breached multiple times before 2021. Notable prior incidents included 2018 (2M records), 2019 (1M records), 2020 (200K records affecting prepaid customers), and a separate 2020 incident affecting employee data. Each had been individually disclosed and resolved with relatively modest penalty. The 2021 incident at 77M records was an order of magnitude larger than any prior, but its severity was compounded in the regulatory response by the pattern of prior incidents.
The FCC consent decree issued 30 September 2024 explicitly cited the pattern of prior T-Mobile breaches as an aggravating factor in determining the civil penalty. The decree included T-Mobile alongside AT&T, Verizon, and Comcast in a coordinated multi-carrier action covering CPNI breach response. T-Mobile's $15.75M civil penalty in the coordinated action was higher per-carrier than the other settled carriers, reflecting the repeat-offender framework.
The repeat-offender precedent has been adopted by state AGs and the FTC in subsequent breach enforcement matters. The structural shift is toward penalty calculation that explicitly accounts for incident history, with significantly higher per-record penalty applied when a respondent has prior incidents. The change has produced strong incentive for organisations to actually remediate root causes after the first incident rather than treating the response as a one-time cost.
Section TMO.5
What T-Mobile actually spent the $150M on
T-Mobile's court-supervised reporting on the $150M security investment commitment, filed quarterly with the Western District of Missouri, provides a relatively rare public window into the composition of post-breach security investment at a major telecom. Reported categories include: identity-and-access management consolidation (consolidation of authentication directories, MFA enforcement across employee and contractor populations, privileged-access-management deployment), data-loss-prevention tooling for production and testing environments (the latter directly addressing the breach root cause), security-operations-centre expansion (additional analysts, expanded coverage hours, enhanced threat-intelligence integration), and incident-response retainer enhancement (expanded retainer with Mandiant plus secondary retainer with CrowdStrike for redundancy).
Subsequent T-Mobile breach disclosures in 2023 (37M records via an API abuse incident) and other smaller incidents suggest that the $150M investment did not fully eliminate the underlying security posture issues. The 2023 incident produced an additional FCC investigation and contributed to the 2024 multi-carrier consent decree.
Cross-references
Cost / Class-action settlement
→$350M T-Mobile as benchmark for telecom breach settlements.
Cost / Credit monitoring
→Two-year credit monitoring as settlement compensation.
Regulation / SEC Item 1.05
→Telecom-sector disclosure timing under public-company rules.
Cost / Forensics
→Telecom-specific IR engagement scope and cost.
Index / All breach cases
→22 verified mega-breach case studies.
Schedule F / Reference Q&A
Frequently Asked Questions
Primary source:T-Mobile 2021 breach data from In re T-Mobile Customer Data Security Breach Litigation Western District of Missouri, T-Mobile SEC 10-K filings 2021-2024, FCC consent decree 30 September 2024 covering T-Mobile, AT&T, Verizon, and Comcast, and contemporaneous interviews with John Erin Binns published in Wall Street Journal August 2021.