• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
telstra suffers 'sizeable' data breach, mandates two step security upgrade

Telstra suffers ‘sizeable’ data breach, mandates two-step security upgrade

You are here: Home / General Cyber Security News / Telstra suffers ‘sizeable’ data breach, mandates two-step security upgrade
October 4, 2022

Getty Pictures

Australia’s greatest telecoms operator Telstra has been hit by a info breach and has told consumers they will have to enable two-action identification defense on their accounts within a thirty day period.

The coverage will come into effect on 5 Oct, a new web site banner exhibits. The announcement of enhanced security measures have arrived just two months immediately after rival telco Optus also endured a comparable attack.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Telstra confirmed the facts breach involved the accessibility of employee aspects, even though it was not a breach of a Telstra method. The corporation explained a third-party system was breached rather and was applied to obtain the telco’s facts.

The company verified the data concerned in the breach belonged only to Telstra workers and included first and very last names as properly as email addresses. The knowledge by itself dates back again to 2017 and no buyers are considered to be affected.

Close to 30,000 previous and present workers ended up influenced in the info breach, as reported by 7Information, with the information and facts currently being posted on Breach Forum, the exact same discussion board on which information associated in the Optus breach was posted two months ago.

The hack similar to info handled by a third corporation party for the telco’s WorkLife NAB rewards programme for employees, operate by Pegasus Group Australia/MyRewards Worldwide.

The particulars had been leaked on the forum last week but there isn’t any personal information contained in it, only specialist facts, the very same sort that can be discovered on Google or LinkedIn, a source instructed the local information outlet.

You could have read about a facts breach involving Telstra employee facts. Right here are the important info:👉 This wasn’t a breach of any Telstra system👉 No customer account facts was included👉 The facts contains 1st/previous names and staff email addresses👉 The data is from 2017

— Telstra (@Telstra) October 4, 2022

The benefits programme is a platform the corporation no for a longer time works by using and has not utilised for a number of decades, they included. They claimed the hacker is making an attempt to sell off the knowledge as new info, much too.

“The knowledge released is really standard in nature – minimal to whole names and email addresses employed to indication up to the system,” a Telstra spokesperson claimed. “No client account details was involved. We feel it is been created readily available now in an endeavor to profit from the Optus breach.”

Telstra has notified the pertinent authorities as effectively as recent staff. It extra that whilst the data is of small risk to former staff members, it will endeavor to notify them far too.

“This newest breach at Telstra is a stark reminder that just managing your personal security posture is not good more than enough,” said Markus Strauss, head of product management at Runecast to IT Pro. 

“Far way too generally companies are targeted on their possess inner security efforts, all while forgetting the 3rd-party suppliers that potentially have obtain to their environments or their info. The conclude result is what we see at Telstra, the unauthorised obtain to information. Firms require to wake up to the very genuine danger of 3rd-party tools and companions and need far better security and attestation of their security measures as component of the onboarding of any new third-party supplier.”

The data breach happened right immediately after Optus was strike by a cyber attack final month, resulting in the leaking of sensitive shopper details. The telco claimed that it perhaps exposed info like consumer names, phone numbers, email addresses, and dates of start. Some consumers may also have experienced their passport and driving licence figures uncovered in the attack.

New two-stage security for all customers

The new two-step policy was released to help guarantee that Telstra is chatting to the customer as a substitute of anyone pretending to be them, it mentioned.

Consumer reports on an Australian forum indicated that Telstra end users 1st encountered the new banner informing them of the new two-phase authentication coverage past 7 days.

Rather of a regular two-factor authentication (2FA) model, it will contain introducing an supplemental security layer to accounts whereby buyers log in applying their phone range and a particular identification range (PIN), in accordance to consumers who were served the banner.

“As of Oct, this will become a obligatory stage for our clients following the introduction of new consumer id verification policies by the Australian Communications and Media Authority (ACMA),” said Telstra.

The ACMA imposed the new policies as of 30 June 2022 but in accordance to stories that thirty day period, Telstra had not discovered a date by which it planned to implement the required protections to meet up with the regulator’s new benchmarks.


Some parts of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «cisa orders federal agencies to regularly track network assets and CISA Orders Federal Agencies to Regularly Track Network Assets and Vulnerabilities
Next Post: BEC Scammer Gets 25-Year Jail Sentence for Stealing Over $9.5 Million bec scammer gets 25 year jail sentence for stealing over $9.5»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.