• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hacker behind optus breach releases 10,200 customer records in extortion

Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme

You are here: Home / General Cyber Security News / Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme
September 27, 2022

The Australian Federal Law enforcement (AFP) on Monday disclosed it truly is working to acquire “very important proof” and that it can be collaborating with abroad law enforcement authorities pursuing the hack of telecom service provider Optus.

“Operation Hurricane has been launched to detect the criminals behind the alleged breach and to support protect Australians from identification fraud,” the AFP claimed in a assertion.

The improvement will come soon after Optus, Australia’s next-major wi-fi carrier, disclosed on September 22, 2022, that it was a sufferer of a cyberattack. It claimed it “right away shut down the attack” as soon as it came to light-weight.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

The menace actor powering the breach also briefly launched a sample of 10,200 data from the breach – placing individuals buyers at heightened risk of fraud – in addition to inquiring for $1 million as element of an extortion demand from customers. The dataset has considering that been taken down, with the attacker also declaring to have deleted the only copy of the stolen info.

Optus, which is a wholly-owned subsidiary of Singtel, is estimated to have around 10 million subscribers as of December 2019. The telco did not reveal when the incident took area.

Despite the fact that Optus has not still verified how numerous clients could have been impacted by the breach, it stated the unauthorized access could have exposed their names, dates of start, phone numbers, email addresses, and, for a subset of buyers, addresses, ID doc numbers these as driver’s license or passport numbers.

Optus Breach Data Leak

To make matters worse, facts belonging to previous prospects are also said to have been afflicted, boosting issues about how extensive telecom suppliers ought to be needed to keep these kinds of info. Payment specifics and account passwords, even so, have not been compromised.

Optus, in its privacy plan, notes that while consumers can request to have their particular info deleted, it may well not usually be capable to do so, citing lawful obligations. “The Telecommunications Interception and Access Act 1979 (Cth) could require us to keep some of your personal information for a time period of time,” it says.

CyberSecurity

The business has still to share extra facts on how the hack took location, but in accordance to ISMG security journalist Jeremy Kirk, it associated gaining accessibility by an unauthenticated API endpoint “api.www.optus.com[.]au,” which seems to have been publicly accessible as early as January 2019.

Optus clients are advised to consider steps to safe their on the net accounts, mostly lender and fiscal expert services, as nicely as observe them for any suspicious activity and be on the lookout for potential scams and phishing tries.

To mitigate the risk of id theft, the company further more said it’s offering its “most afflicted recent and previous buyers” a totally free 12-thirty day period membership to credit score monitoring and identification protection assistance Equifax Protect.

“Scammers may use your personalized details to make contact with you by phone, textual content or email,” the Australian Competitors and Purchaser Commission (ACCC) claimed. “By no means click on on inbound links or give individual or economical data to someone who contacts you out of the blue.”

Located this posting intriguing? Follow THN on Facebook, Twitter  and LinkedIn to examine extra exclusive material we publish.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Fitbit Increases Security Requirements, Mandates Google Login From 2023
Next Post: Ukraine Predicts “Massive” Russian Cyber Assault Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.