Optus security breach compromises customers’ passport details


Optus has suffered a security breach that it says may have compromised various customer data, including dates of birth, email addresses, and passport numbers. Information belonging to both current and former customers of the Australian mobile operator are impacted in the security incident. 

Optus said Thursday it was looking into “possible unauthorised access” of customer data following a cyber attack, but did not reveal details of what systems were affected, when the breach was discovered, or how many customers mights be impacted. 

Its CEO Kelly Bayer Rosmarin, though, said: “We have been subject to a cyberattack that has resulted in the disclosure of our customers’ personal information to someone who shouldn’t see it. As soon as we knew, we took action to block the attack and began an immediate investigation.”

Rosmarin noted that while not all customers might be affected, investigations still were ongoing. 

According to Optus, the security breach could have compromised various customer data, including dates of birth, phone numbers, and email addresses, as well as additional information such as addresses and identification document details that included driver’s licence and passport numbers for a specific group of customers. 

Financial details and account passwords were not affected by the breach, the Australian operator said. However, it said major financial institutions were notified about the breach. It also urged customers to keep watch on unusual or potential fraudulent activities.

Optus said it had notified the relevant authorities, including the Australian Federal Police, and was working with the Australian Cyber Security Centre on the incident. 

A wholly-owned subsidiary of Singtel, Optus is Australia’s second-largest telco. In 2019, it had some 10.2 million mobile subscribers. 

The carrier was involved in previous data privacy incidents, including a 2013 breach in which the operator accidentally published the names, addresses, and mobile phone numbers of 122,000 customers without their consent. In a 2008 incident, Optus left open the management ports of Netgear and Cisco Systems modems to facilitate remote access, leaving customers who did not change the default administrative passwords on the appliances vulnerable to potential hacks. 

RELATED COVERAGE



Source link

Related articles

An attacker focusing on Kelp DAO's LayerZero-powered cross-chain bridge, seems to have drained ~$292M value of rsETH earlier than Kelp paused all rsETH contracts...

Zack Abrams / The Block: An attacker focusing on Kelp DAO's LayerZero-powered cross-chain bridge, seems to have drained ~$292M value of rsETH earlier than Kelp paused all rsETH contracts  —  Fast Take  —...

XRP Growth Into Solana Sparks Contemporary Demand: Ripple CEO

XRP holders can now commerce, earn yield, and faucet liquidity on Solana — with out ever promoting their tokens. Associated Studying A Bridge Between Two Networks That functionality grew to become actual this week when wrapped...

Your EA’s ‘Sensible Restoration’ Is Martingale in Disguise (Here is Tips on how to Verify) – My Buying and selling – 18 April 2026

"Grid restoration." "Dynamic lot scaling." "Clever place administration." "Sensible restoration mode." These are all advertising names for a similar factor: martingale — doubling...

Oil majors face setback in $5 billion Kashagan environmental positive enchantment

(Bloomberg) – The oil majors that function Kazakhstan’s second-largest discipline misplaced one other courtroom enchantment over an environmental positive of about $5 billion, additional narrowing their choices to battle the penalty.  ...

RAVE Token Enters Prime 20 After Staggering 10,000% Month-to-month Surge

Key Takeaways: RaveDAO’s RAVE token soared 10,000% since April 1, hitting a file $27.88 and a $6.6 billion market cap. Excessive volatility on Binance and Bitget worn out 16,000 merchants in a...
spot_img

Latest articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

WP2Social Auto Publish Powered By : XYZScripts.com