The hacker powering previous week’s Optus info breach appears to be to have taken down the database containing customers’ released data.
A consumer heading by ‘optusdata’ and publishing on BreachForums claimed obligation for the attack before nowadays and reported they had deleted the only copy of the stolen information.
“Also many eyes. We will not [sell] details to any individual. We won’t be able to if we even want to: individually deleted info from travel (Only copy).”
Nevertheless, the alleged hacker also apologized to 10,000 Australian folks whose information had been leaked.
“Australia will see no achieve in fraud this can be monitored. Probably for 10.200 Australian but rest of inhabitants no. Quite sorry to you.”
On top of that, the BreachForums user reported they would have contacted Optus to permit them know firsthand about the breach, but the hacker could not locate a dedicated Optus channel for security–related matters.
The meant hacker concluded their article by indicating that even if the ransom was not paid, they did not care any more.
“[It] was [a] oversight to scrape [and] publish [the] facts in [the] 1st area.”
The publish arrives hours following the legal professional normal, Mark Dreyfus, confirmed that the Federal Bureau of Investigation in the US was assisting the Australian Federal Police’s (AFP) operation in finding who may have accessed the information and who was attempting to sell it.
“The AFP is accumulating very important proof from the breach of Optus information and is doing work closely with abroad legislation enforcement to establish the offenders behind this attack,” the AFP wrote in a weblog submit.
“Procedure Hurricane has been launched to establish the criminals powering the alleged breach and to enable defend Australians from identification fraud.”
Further more, the AFP verified it is mindful of stories of the sale of stolen details, and investigations are continuing.
“With that in mind, we check with all Australians to imagine about their on line security and acquire functional actions to better guard by themselves from ripoffs and phishing makes an attempt,” explained assistant commissioner of Cyber Command Justine Gough.
“Users of the general public, primarily recent and former Optus clients, should be extra vigilant in checking unsolicited textual content messages, email messages and phone phone calls.”
At the time of composing, it is unclear how many of Optus’ 9.7 million subscribers had been influenced by the breach, but the firm did beforehand admit some home addresses, driver’s licenses and passport figures were being most likely accessed by the attacker.
Some pieces of this write-up are sourced from: