• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
19 year old hacker arrested for using leaked optus breach data in

19-Year-Old Hacker Arrested for Using Leaked Optus Breach Data in SMS Scam

You are here: Home / General Cyber Security News / 19-Year-Old Hacker Arrested for Using Leaked Optus Breach Data in SMS Scam
October 6, 2022

The Australian Federal Police (AFP) has arrested a 19-year-aged teenager from Sydney for allegedly trying to leverage the info leaked adhering to the Optus knowledge breach late last thirty day period to extort victims.

The suspect is said to have carried out a text information blackmail rip-off, demanding that the recipients transfer $2,000 to a financial institution account or risk having their private info misused for fraudulent things to do.

The resource of the info, the agency mentioned, was a sample database of 10,200 data that was posted briefly on a cybercrime forum available on the clearnet by an actor named “optusdata,” just before using it down.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

Aspects of the fraud ended up earlier shared by 9Information Australia reporter Chris O’Keefe on September 27, 2022.

The AFP additional explained it executed a look for warrant at the house of the offender, major to the seizure of a cellular phone used to mail the textual content messages to about 93 Optus customers. “At this stage it appears none of the men and women who gained the text information transferred dollars to the account,” it noted.

The unnamed personal has been billed with working with a telecommunication network with the intent to commit a critical offense and working with identification details. Both the expenses are punishable by a highest penalty of imprisonment for 10 and 7 years, respectively.

CyberSecurity

The arrest arrives as Optus, previously this week, verified that the breach impacted just about 2.1 million of its recent and former customers, exposing their license figures and Medicare ID figures.

The progress also follows the launch of Operation Guardian by the legislation enforcement company to determine the influenced 10,200 folks and watch internet boards for danger actors making an attempt to exploit the produced information and facts for financial profit.

Also set up in the aftermath of the breach is Procedure Hurricane, which aims to unmask the danger actor liable for the breach.

Located this short article exciting? Observe THN on Facebook, Twitter  and LinkedIn to browse far more distinctive written content we publish.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «former uber security chief found guilty of data breach coverup Former Uber Security Chief Found Guilty of Data Breach Coverup
Next Post: Retailer Easylife Fined £1.5m for Data Protection Breaches Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.