Cyber ​​attack on Optus: Millions of customer data stolen

Cyber ​​attack on Optus: Millions of customer data stolen

Share post

On September 22, the Australian telecommunications company Optus fell victim to a cyber attack. The attacker captured millions of customer data. Optus is Australia's second largest telecommunications company with 9,8 million customers.

How many customers are affected and to what extent is still being determined. According to media reports, such as The Guardian, 2,8 million customers are affected to a greater extent. Information that may have been disclosed includes names, dates of birth, phone numbers, email addresses, and — for a subset of customers — addresses and identification document numbers such as driver’s license or passport numbers, Optus explains on its website. According to the company, the affected customers would be informed directly about the information at risk. Curtis Simpson, CISO at Armis commented on the attack.

Millions of customer data stolen

“The far-reaching consequences of this attack have yet to be revealed. Leaking sensitive data from millions of customers, this is one of the largest attacks Australia has ever seen. The company has confirmed that it was able to prevent further penetration of the criminal hacker into its operations. If the attacker had gotten any further, this could have led to significant impairments in the everyday life of the civilian population, such as interrupted availability of mobile phone services, blocking access to streaming services and more. However, the consequences are still devastating and are progressing rapidly in the Australian system.

Data is a valuable resource and must be protected with extreme care as it can easily be exploited by scammers. For mobile operators, whose operations have evolved and changed significantly in recent years, this protection requires ongoing visibility and insight into the behavior of all assets. Of particular concern are unmanaged assets that have the potential to disrupt critical operations and/or customer services; these include, but are not limited to, IoT devices, OT infrastructure, and mobile IoT.

Risk and Threat Management

Maintaining secure service availability in such a diverse and hybrid ecosystem requires a fundamental and ongoing understanding of technology in the enterprise landscape. All downstream proactive and reactive risk and threat management strategies must be executed against this ever-evolving view of the business and attack surfaces.

As attacks of this magnitude become more common, organizations need to reassess their risk posture and use industry frameworks to determine which risks are “acceptable” and which are intolerable. This gives them all the information they need to strengthen their security situation. In order to eliminate critical vulnerabilities and avoid security blind spots, it is imperative to increase our focus on full transparency.”

More at Optus.com.au

 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more