Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Techie Discovers Flaw in Trump Mobile Website, Exposing Millions of Customer Records


Trump Mobile's website was leaking customer data at an alarming rate, with tens of thousands of records potentially exposed due to a glaring flaw in the site's security measures. A self-taught tech enthusiast has revealed the vulnerability, which allows anyone with basic knowledge of HTTP requests to access sensitive information.

  • A self-taught tech enthusiast discovered a glaring flaw in Trump Mobile's online platform, potentially putting tens of thousands of customers at risk.
  • The vulnerability was found through an HTTP POST request to the API endpoints, allowing access to sensitive customer data.
  • Over 27,000 customers were affected by the breach, highlighting poor security measures by the company.
  • The lack of transparency and accountability within Trump Mobile's development processes may have contributed to the breach.



  • The world of technology is replete with tales of intrigue and deception, where a seemingly innocuous website can harbor secrets that could compromise the sensitive information of millions. A recent discovery has brought such a scenario to light, as a self-taught tech enthusiast has revealed a glaring flaw in Trump Mobile's online platform, potentially putting tens of thousands of customers at risk.

    According to Connor Jones, the individual behind the discovery, he stumbled upon the vulnerability while examining the website's API endpoints. By exploiting this weak point, he was able to access and retrieve an extensive array of customer data, including first and last names, primary addresses, secondary addresses, email addresses, phone numbers, customer/account numbers, "enrollment ID" (pre-order number), and whether the order was placed by phone or online.

    "It wasn't SQL. That wouldn't be as bad," Jones said in an interview with The Register. "It was a really simple HTTP request. POST, and then just asking for the info I wanted, basically." He described the process as "as easy as going to the website and writing a very simple HTTP POST request into the console."

    The sheer scale of this breach is staggering. With over 27,000 customers affected, it's clear that Trump Mobile's security measures have fallen woefully short. The fact that such a glaring vulnerability could exist without being detected for so long raises serious questions about the company's commitment to protecting its customers' data.

    Jones, who described himself as "just a nerd between jobs with too much time on my hands," claimed that he had attempted to contact Trump Mobile and other relevant authorities regarding his findings. However, he reported receiving no response or acknowledgement of his concerns.

    In light of this discovery, many are left wondering how such a catastrophic breach could have been allowed to occur. The answer may lie in the lack of transparency and accountability within the company's development processes. If Trump Mobile had implemented robust security measures from the outset, it is possible that such a breach would never have occurred in the first place.

    The incident serves as a stark reminder of the importance of prioritizing data protection and security in today's digital landscape. As technology continues to advance at an unprecedented pace, it is essential that companies prioritize the safety and well-being of their customers' sensitive information.

    In the meantime, Trump Mobile has yet to comment on the matter, leaving many to wonder what steps the company will take to rectify this situation and prevent such breaches in the future.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Techie-Discovers-Flaw-in-Trump-Mobile-Website-Exposing-Millions-of-Customer-Records-ehn.shtml

  • https://www.theregister.com/security/2026/05/22/trump-mobile-site-leaks-customer-data-as-phone-finally-ships/5244828


  • Published: Fri May 22 07:38:50 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us