What you Need to Know About Experian Data Breach of 2015

  • By David Lukic
  • Jan 18, 2021

The Experian data breach of 2015 affected 15 million consumers, especially those who were also T-Mobile customers. Experian claims that the hack only affected T-Mobile customers and information provided when applying for credit with T-Mobile. The information that cybercriminals accessed includes names, addresses, and social security numbers, driver’s license, and passport numbers from credit applications from 2013-2015. Although some of the information was encrypted, because it was stored on the same server, the encryption was also compromised during Experian breach.

When Was the Experian Data Breach?

The Experian data breach was discovered and reported in late 2015 and it affected T-Mobile customers who applied for credit between Sept. 1, 2013, and Sept. 16, 2015. Experian stresses the fact that no payment information or credit information was accessed during this Experian T-Mobile breach. They are also very careful to remind customers that it did not affect any other customers and was strictly isolated to T-Mobile client data. To date, no one has been caught for this crime.

Experian Data Breach

How to Check if Your Data Was Breached

The first thing to do is to perform an Experian data breach check. If you applied for credit with T-Mobile in September of 2013 to September of 2015, you should make sure your information was not affected. You can always use IDStrong to check your own information online to see if your identity has been stolen or used without your permission. Additionally, you can contact Experian or T-Mobile directly to inquire about the breach and how to find out if your information was affected.

What to Do if Your Victim of Experian Breach.

If you were one of the affected parties, you should not take this data breach lightly. The first step is to review your credit reports to look for any suspicious activity. Then you will want to change any information that you can safely. Although banking and credit information was not part of this data breach, personal information that can be used to steal your identity was taken.

Are There Any Lawsuits or Settlements for Experian Breach?

Although there are no Experian lawsuits or Experian data breach settlements available, Experian is offering some complementary services through a partner website. IDStrong offers comprehensive credit monitoring services to keep all your information safe.

Experian has set up a website with questions and answers for customers who are concerned and want to find out more. 

Experian Breach

Can My Information from Experian Hack be Used for Identity Theft?

Even the limited amount of information acquired by hackers is enough to steal your identity and open lines of credit in your name or apply for a driver’s license or passport. Identity theft is a serious issue, and you cannot be too careful when protecting yourself. Be warned that T-Mobile nor Experian will ever call you on the phone to request personal Experian account details or information. Never give out your social security number, credit cards, or birth date to anyone you don’t know or in situations where you did not initiate the interaction.

What to Do to Protect Yourself

When it comes to personal information, it seems impossible these days to keep it safe. With so much of life online and data breaches occurring regularly, it can be challenging, but there are things you can do to protect yourself.

  • Keep your computer and other devices secure with strong passwords.
  • Update your antivirus protection and run scans often.
  • Monitor your bank, credit card statements and credit reports regularly.
  • Change passwords for logins frequently and use complex combinations of letters, numbers and symbols.  
  • Be on the lookout for phishing scams and suspicious emails or calls requesting information.
  • Never click on links in emails or download attachments.
  • Don’t give out your personal information to anyone unless absolutely necessary. 
  • If you are a victim of fraud or identity theft, report it to the authorities immediately.
Stay alert, use common sense, and always be on the lookout for something that just doesn’t seem right.


About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that mu ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What is an Incident Response?

What is an Incident Response?

What is an Incident Response? After a bank heist, the work begins with specialized teams and plans engaged, allowing for analysis of the event, and from this analysis, the bank can prepare a response to the incident.

What is a Social Engineering Attack? Techniques and Ways to Prevent

What is a Social Engineering Attack? Techniques and Ways to Prevent

Everyone has received a spam text or email at some point. Their hallmarks are widely known; they often include poor or strange grammar, suspicious links, suggested connections with companies or people, or random individuals asking for help in some capacity.

Side Channel Attack: Everything You Need To Know

Side Channel Attack: Everything You Need To Know

Every year, millions of people get victimized by data breaches. Criminals steal their data from the network environments of organizations, vendors, providers, institutions, and governments; with ever-increasing frequency, cybercriminals are making big moves in the cyber wars—and making billions of dollars. 

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close