According to an outage tracking service, T-Mobile subscribers in the United States reported network problems late Monday. The business claimed it was immediately correcting a problem that had disrupted some cellular services, citing the causes of the outage.
The cellular provider in the United States announced that it was trying to resolve an issue that was causing intermittent disruptions with voice, message, and internet services in many places. It did not specify how many people were affected.
According to Downdetector, which analyses outages by aggregating status updates from various sources, including user-submitted mistakes, the number of complaints of T-Mobile outages in the previous 24 hours peaked at more than 83,000 at roughly 10:20 p.m. ET (03:20 GMT). By midnight ET, the number had dropped to around 9,000.
T-Assistance Mobile’s page reacted to Twitter posts from consumers experiencing issues, stating that the concerns would be reviewed. It gave no information on the scope or cause of the outage.
“Our teams are rapidly addressing a 3rd party fibre interruption issue that has intermittently impacted some voice, messaging, and data services in several areas,” T-Mobile’s President of Technology Neville Ray said on Twitter.
Downdetector also recorded thousands of instances of other U.S. wireless companies’ services being down, including Verizon Inc. and AT&T Inc. At its peak, the website featured over 2,000 unresolved incident reports for Verizon and over 1,200 for AT&T.
Meanwhile, a data breach affecting around 37 million T-Mobile US Inc. users happened last month as a result of an attack on an API, or application programming interface, underscoring the danger faced by many firms.
APIs are used to link applications and share information in a variety of scenarios, including mobile applications that connect to a social networking platform, automobiles that drivers may unlock using an app, and backroom technology that transports data between multiple information systems.
APIs are used by businesses to develop technological initiatives, frequently without sufficient security precautions, according to cybersecurity professionals and academics.
“Every API you add is a new addition to your overall attack surface,” said Theresa Payton, chief executive of Fortalice Solutions LLC, a cybersecurity consulting firm.