<?xml version="1.0" encoding="utf-8" ?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:tt="http://teletype.in/" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"><title>News: Hacking</title><subtitle>News about hackers and hacking. Subscribe if you want to keep abreast of the latest data leaks and breaches.</subtitle><author><name>News: Hacking</name></author><id>https://teletype.in/atom/peterbrooks</id><link rel="self" type="application/atom+xml" href="https://teletype.in/atom/peterbrooks?offset=0"></link><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><link rel="next" type="application/rss+xml" href="https://teletype.in/atom/peterbrooks?offset=10"></link><link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></link><updated>2026-04-11T19:41:31.699Z</updated><entry><id>peterbrooks:CHxowm5QfGW</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/CHxowm5QfGW?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>Yukon education department exposed students' personal info</title><published>2022-09-29T11:14:11.281Z</published><updated>2022-09-29T11:14:11.281Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img4.teletype.in/files/f0/ab/f0ab8cff-5dfb-4a91-981b-5269ad7cbdff.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img1.teletype.in/files/8b/9a/8b9a4b51-9d97-404f-94cf-dfbae60ba27e.png&quot;&gt;An education department worker exposed the data of more than 500 Yukon students, according to a notification obtained by CBC News.</summary><content type="html">
  &lt;figure id=&quot;xPbo&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/8b/9a/8b9a4b51-9d97-404f-94cf-dfbae60ba27e.png&quot; width=&quot;754&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;ksps&quot;&gt;An education department worker exposed the data of more than 500 Yukon students, according to a notification obtained by CBC News.&lt;/p&gt;
  &lt;p id=&quot;mFdz&quot;&gt;The breach involves a risk of significant harm to students&amp;#x27; privacy. The following data was exposed:&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;ul id=&quot;ycOh&quot;&gt;
      &lt;li id=&quot;9lAE&quot;&gt;Full names, &lt;/li&gt;
      &lt;li id=&quot;bEBP&quot;&gt;Phone numbers, &lt;/li&gt;
      &lt;li id=&quot;HBgb&quot;&gt;Email addresses, &lt;/li&gt;
      &lt;li id=&quot;H0YJ&quot;&gt;Dates of birth,&lt;/li&gt;
      &lt;li id=&quot;sTrl&quot;&gt;Social insurance numbers.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;p id=&quot;Aj2T&quot;&gt;The data leak happened on Aug. 24.&lt;/p&gt;
  &lt;p id=&quot;5IrG&quot;&gt;A spokesperson for the Office of the Information and Privacy Commissioner said the office &amp;quot;is aware of the breach, and will work with the Department of Education to ensure it has met its obligations under the Access to Information and Protection of Privacy Act.&lt;/p&gt;
  &lt;p id=&quot;62Fn&quot;&gt;The spokesperson said people can still file a complaint to the privacy commissioner&amp;#x27;s office.&lt;/p&gt;
  &lt;p id=&quot;17s0&quot;&gt;Recently, &lt;a href=&quot;https://hackingnews.live/Tn0aToEKAxU&quot; target=&quot;_blank&quot;&gt;Physician’s Business Office notified 196,573 patients&lt;/a&gt; that their personal information and protected health data was stolen.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:Tn0aToEKAxU</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/Tn0aToEKAxU?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>197K patients impacted by data breach at Physician’s Business Office impacts</title><published>2022-09-29T09:37:04.114Z</published><updated>2022-09-29T09:37:04.114Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img4.teletype.in/files/f1/2a/f12a36e8-aa15-4b94-8fa5-565bba6d1a4b.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img4.teletype.in/files/3d/98/3d981041-6f0a-4360-abb9-409df4d87810.png&quot;&gt;Physician’s Business Office (PBO) notified 196,573 patients that their personal information and protected health data was stolen.</summary><content type="html">
  &lt;figure id=&quot;Zesx&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/3d/98/3d981041-6f0a-4360-abb9-409df4d87810.png&quot; width=&quot;750&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;pW6y&quot;&gt;Physician’s Business Office (PBO) notified 196,573 patients that their personal information and protected health data was stolen.&lt;/p&gt;
  &lt;p id=&quot;Ba67&quot;&gt;&lt;em&gt;Based in West Virginia, PBO is a medical practice management and administrative services for healthcare providers.&lt;/em&gt;&lt;/p&gt;
  &lt;p id=&quot;GrLw&quot;&gt;PBO disclosed unusual activity in its network environment in April and took steps to secure its IT systems. An outside digital forensics and incident response firm was brought on to assist, which found data stored on the network was accessed “and potentially acquired without authorization” during the data security incident.&lt;/p&gt;
  &lt;p id=&quot;5C8O&quot;&gt;Under the Health Insurance Portability and Accountability Act, covered entities and business associates are required to report any breaches of PHI affecting over 500 patients within 60 days of discovery. &lt;/p&gt;
  &lt;p id=&quot;oOsF&quot;&gt;The stolen data could include:&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;ul id=&quot;t3BY&quot;&gt;
      &lt;li id=&quot;HhQN&quot;&gt;Full names, &lt;/li&gt;
      &lt;li id=&quot;xeR5&quot;&gt;Social Security numbers, &lt;/li&gt;
      &lt;li id=&quot;YsLC&quot;&gt;Dates of birth, &lt;/li&gt;
      &lt;li id=&quot;PRqg&quot;&gt;Driver’s licenses, &lt;/li&gt;
      &lt;li id=&quot;rMK0&quot;&gt;Treatments, &lt;/li&gt;
      &lt;li id=&quot;vPnm&quot;&gt;Diagnoses, &lt;/li&gt;
      &lt;li id=&quot;WCwX&quot;&gt;Contact details, &lt;/li&gt;
      &lt;li id=&quot;6Zqc&quot;&gt;Disability codes, &lt;/li&gt;
      &lt;li id=&quot;TqEF&quot;&gt;Prescription information and health insurance account details. &lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;p id=&quot;IWdu&quot;&gt;Patients will receive free credit monitoring and identity theft protection services.&lt;/p&gt;
  &lt;p id=&quot;a1wB&quot;&gt;In the same time, an Elasticsearch server belonging to a healthcare software provider in India &lt;a href=&quot;https://hackingnews.live/1Lgcxom-EO5&quot; target=&quot;_blank&quot;&gt;is currently exposing the Covid antigen test results&lt;/a&gt; of Indians and foreign nationals who traveled to or from India in the last couple of years.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:m0F8V8ToBN2</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/m0F8V8ToBN2?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>Mysterious Team Bangladesh targeting Indian govt servers</title><published>2022-09-27T13:51:42.457Z</published><updated>2022-09-27T13:51:42.457Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img4.teletype.in/files/f7/4f/f74f2781-ed12-4034-9428-61f0503b0c74.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img4.teletype.in/files/33/53/3353a22f-5c64-40c5-810d-3e72a3c606aa.jpeg&quot;&gt;On Sept. 22, cybersecurity experts reported they have discovered a hacktivist group from Bangladesh that is targeting the Indian government's websites and servers.</summary><content type="html">
  &lt;figure id=&quot;rlQV&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/33/53/3353a22f-5c64-40c5-810d-3e72a3c606aa.jpeg&quot; width=&quot;750&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;xOjP&quot;&gt;On Sept. 22, cybersecurity experts reported they have discovered a hacktivist group from Bangladesh that is targeting the Indian government&amp;#x27;s websites and servers.&lt;/p&gt;
  &lt;blockquote id=&quot;gBMR&quot;&gt;Websites belonging to governments of Assam, Madhya Pradesh, Uttar Pradesh, Gujarat, Punjab and Tamil Nadu were affected.&lt;/blockquote&gt;
  &lt;p id=&quot;LxqA&quot;&gt;The group called Mysterious Team Bangladesh (MTB) is using DDoS (Distributed Denial of Service) attacks against domains and subdomains of several state governments and a web server hosted by the Indian government, according to the team from cyber-security firm CloudSEK.&lt;/p&gt;
  &lt;p id=&quot;QRii&quot;&gt;The members of the group primarily reside in the Chittagong area of Bangladesh and either study in college or have recently graduated. Hacktivism appears to be their predominant motivation and the group majorly operates and communicates via Facebook, Telegram and Twitter.&lt;/p&gt;
  &lt;p id=&quot;Yfq9&quot;&gt;Cybersecurity researchers said:&lt;/p&gt;
  &lt;blockquote id=&quot;zD6J&quot;&gt;Through meticulous analysis and profiling of multiple groups, it can be rightly concluded that such hacktivist groups collaborate among each other excessively to conduct nefarious attacks, DDoS being the primary one, followed by defacing attacks.&lt;/blockquote&gt;
  &lt;p id=&quot;720v&quot;&gt;One of the co-founders of Mysterious Team Bangladesh has been recognised as Taskin Ahmmed.&lt;/p&gt;
  &lt;p id=&quot;Hs5H&quot;&gt;The rest of the group primarily consists of students or recent graduates between the age of 20 to 25 years that previously operated under hacker organisations, like Elite Force 71, Bangladesh Cyber Anonymous Team, and Taskin Vau.&lt;/p&gt;
  &lt;p id=&quot;FGLX&quot;&gt;In the same time, &lt;a href=&quot;https://hackingnews.live/zSu4Rt5rNIp&quot; target=&quot;_blank&quot;&gt;Anonymous hacker collective have claimed&lt;/a&gt; to be behind attacks on several websites affiliated with the Iranian government amid protests following the death of 22-year-old Mahsa Amini.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:1Lgcxom-EO5</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/1Lgcxom-EO5?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>Covid test results of 1.7m people exposed online</title><published>2022-09-26T15:06:35.300Z</published><updated>2022-09-26T15:06:35.300Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img3.teletype.in/files/e8/c2/e8c2b054-8ae5-4d6b-984c-de5d84d0cb8a.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img1.teletype.in/files/c4/8d/c48d24ef-32d4-48a1-871c-ee0bb5a597c0.jpeg&quot;&gt;An Elasticsearch server belonging to a healthcare software provider in India is currently exposing the Covid antigen test results of Indians and foreign nationals who traveled to or from India in the last couple of years.</summary><content type="html">
  &lt;figure id=&quot;ol8A&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/c4/8d/c48d24ef-32d4-48a1-871c-ee0bb5a597c0.jpeg&quot; width=&quot;761&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;HDlk&quot;&gt;An Elasticsearch server belonging to a healthcare software provider in India is currently exposing the Covid antigen test results of Indians and foreign nationals who traveled to or from India in the last couple of years.&lt;/p&gt;
  &lt;p id=&quot;qehu&quot;&gt;&lt;em&gt;It is worth noting that these tests were taken through a rapid antigen kit known as Covi-Catch. Covi-Catch is an Indian Council of Medical Research (ICMR) approved self-testing kit for COVID-19.&lt;/em&gt;&lt;/p&gt;
  &lt;p id=&quot;WmoP&quot;&gt;What’s worse, the server is still exposed and publicly accessible without any security authentication or password. Originally, the server is being exposed since July 2, 2022.&lt;/p&gt;
  &lt;p id=&quot;Aa5q&quot;&gt;It all started when Anurag scanned for misconfigured databases on Shodan and noted a server exposing more than 23GB worth of data to public access. Anurag said that the server belongs to a company based in Gurgaon, Haryana, India, but we would not share the name of the company in this article because the server is still exposed.&lt;/p&gt;
  &lt;p id=&quot;NYTY&quot;&gt;Anurag’s analysis of the server revealed that the exposed records are actually Covid antigen test results, while the number of victims in the incident is over 1.7 million. These results not only comprise personal records but medical records of travelers including the following information:&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;ul id=&quot;gFf8&quot;&gt;
      &lt;li id=&quot;oLyW&quot;&gt;Gender&lt;/li&gt;
      &lt;li id=&quot;Ls1f&quot;&gt;Full names&lt;/li&gt;
      &lt;li id=&quot;Vze5&quot;&gt;Nationality&lt;/li&gt;
      &lt;li id=&quot;r84g&quot;&gt;Date of birth&lt;/li&gt;
      &lt;li id=&quot;k69m&quot;&gt;Full addresses&lt;/li&gt;
      &lt;li id=&quot;vItV&quot;&gt;Phone numbers&lt;/li&gt;
      &lt;li id=&quot;0z7a&quot;&gt;Vote ID numbers&lt;/li&gt;
      &lt;li id=&quot;Sgq0&quot;&gt;Covid test results&lt;/li&gt;
      &lt;li id=&quot;hfxC&quot;&gt;Aadhaar numbers&lt;/li&gt;
      &lt;li id=&quot;pxtM&quot;&gt;Passport numbers&lt;/li&gt;
      &lt;li id=&quot;ypN5&quot;&gt;Underlying medical conditions&lt;/li&gt;
      &lt;li id=&quot;usJ7&quot;&gt;Vaccine details (vaccine type, vaccine taken or not).&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;p id=&quot;xz3l&quot;&gt;Recently, &lt;a href=&quot;https://hackingnews.live/zSu4Rt5rNIp&quot; target=&quot;_blank&quot;&gt;Anonymous hacker collective have claimed&lt;/a&gt; to be behind attacks on several websites affiliated with the Iranian government amid protests following the death of 22-year-old Mahsa Amini.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:zSu4Rt5rNIp</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/zSu4Rt5rNIp?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>Iranian govt sites hacked by Anonymous amid protests following death of Mahsa Amini</title><published>2022-09-24T08:22:38.962Z</published><updated>2022-09-27T13:46:08.885Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img2.teletype.in/files/13/01/1301bdbc-f511-4816-9a37-e7e8a0747d7b.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img2.teletype.in/files/5b/8b/5b8b02f3-7502-4649-a32e-9832df373061.jpeg&quot;&gt;Anonymous hacker collective have claimed to be behind attacks on several websites affiliated with the Iranian government amid protests following the death of 22-year-old Mahsa Amini.</summary><content type="html">
  &lt;figure id=&quot;fRUW&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/5b/8b/5b8b02f3-7502-4649-a32e-9832df373061.jpeg&quot; width=&quot;750&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;ABOa&quot;&gt;Anonymous hacker collective have claimed to be behind attacks on several websites affiliated with the Iranian government amid protests following the death of 22-year-old Mahsa Amini.&lt;/p&gt;
  &lt;p id=&quot;5asR&quot;&gt;Several websites, including for the central bank and the national government portal and state-owned media sites, have been intermittently unreachable.&lt;/p&gt;
  &lt;figure id=&quot;oPwR&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/f4/3f/f43fbcb7-2e2b-42ec-ade3-ac79bcaa1071.png&quot; width=&quot;607&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;hDXf&quot;&gt;Some hacktivist accounts have claimed to have conducted destructive attacks on these government websites, including deleting databases associated with the site for the government spokesperson, although no evidence has been provided for those claims.&lt;/p&gt;
  &lt;p id=&quot;NUGn&quot;&gt;&lt;em&gt;Amini — who was Kurdish and also went by her Kurdish name Jhina Amini — died last Friday while in the custody of the Islamic Republic’s morality police after being detained for what the authorities described as an improper hijab.&lt;/em&gt;&lt;/p&gt;
  &lt;p id=&quot;SK6F&quot;&gt;&lt;em&gt;Although the authorities report that police did not physically attack Amini while she was in custody — instead stating she had a heart attack and died in a hospital — her family have questioned this narrative, saying she had no history of heart problems and had bruises on her legs.&lt;/em&gt;&lt;/p&gt;
  &lt;p id=&quot;8sYQ&quot;&gt;&lt;em&gt;Her death has prompted international and domestic outrage.&lt;/em&gt;&lt;/p&gt;
  &lt;figure id=&quot;JqwZ&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/d3/c7/d3c7ec3f-85c6-47af-ba15-3fe727f53024.png&quot; width=&quot;604&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;ZJjV&quot;&gt;Iran’s ICT minister has said that internet disruptions are possible due to the “national security” implications of the unrest. &lt;/p&gt;
  &lt;p id=&quot;mMpF&quot;&gt;Iranian government authorities have not issued a statement about the hacktivist attacks.&lt;/p&gt;
  &lt;p id=&quot;S8oS&quot;&gt;The other day, &lt;a href=&quot;/fEPf682kFIP&quot;&gt;Starbucks reported its customer database was breached online&lt;/a&gt;, with local media reporting that 200,000 individual&amp;#x27;s information was stolen.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:VFyGepeVvOf</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/VFyGepeVvOf?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>Google’s Tag Manager hacked, sensitive info exposed</title><published>2022-09-23T12:25:07.953Z</published><updated>2022-09-23T12:25:07.953Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img1.teletype.in/files/c1/86/c1869879-1455-4afd-a590-54ba714f2f11.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img3.teletype.in/files/2e/ea/2eeabc62-3a7c-4366-ac9c-8a47cf1638ac.jpeg&quot;&gt;Google’s Tag Manager (GTM) containers were hacked to install malicious e-skimmers that steal payment card data and personally identifiable information of shoppers on e-commerce sites.</summary><content type="html">
  &lt;figure id=&quot;1vZ2&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/2e/ea/2eeabc62-3a7c-4366-ac9c-8a47cf1638ac.jpeg&quot; width=&quot;750&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;2OaV&quot;&gt;&lt;a href=&quot;https://hackingnews.live/iz0Av681GYZ&quot; target=&quot;_blank&quot;&gt;Google&lt;/a&gt;’s Tag Manager (GTM) containers were hacked to install malicious e-skimmers that steal payment card data and personally identifiable information of shoppers on e-commerce sites.&lt;/p&gt;
  &lt;p id=&quot;JYCu&quot;&gt;Thousands of e-commerce sites use Google Tag Manager containers for data on website usage metrics, customer tracking and marketing purposes. &lt;/p&gt;
  &lt;p id=&quot;zszZ&quot;&gt;But cybersecurity experts have found three significant variants of malicious scripts that cybercriminals are hiding within GTM containers that allow them to exfiltrate the personal information of shoppers: &lt;/p&gt;
  &lt;blockquote id=&quot;CBrx&quot;&gt;Over 165,000 payment card records attributed to victims of GTM container abuse attacks have been posted to dark web carding shops. The total number of payment cards compromised via GTM-based e-skimmers is likely higher.&lt;/blockquote&gt;
  &lt;p id=&quot;bF5F&quot;&gt;The cybersecurity researchers found 569 e-commerce domains infected with e-skimmers. According to the report, 314 were confirmed to have been infected by a GTM-based e-skimmer variant while 255 had infections that exfiltrated stolen data to malicious domains associated with GTM abuse. &lt;/p&gt;
  &lt;p id=&quot;hyPm&quot;&gt;Nearly 90 of these e-commerce domains were still infected as of Aug. 25 and on average, researchers found it took more than three months for the infections to be remediated.&lt;/p&gt;
  &lt;p id=&quot;tnKV&quot;&gt;The other day, &lt;a href=&quot;https://hackingnews.live/fEPf682kFIP&quot; target=&quot;_blank&quot;&gt;Starbucks reported its customer database was breached online&lt;/a&gt;, with local media reporting that 200,000 individual&amp;#x27;s information was stolen.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:GCrmk4b5uht</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/GCrmk4b5uht?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>Optus under massive hacker attack, customer info stolen</title><published>2022-09-22T17:00:47.456Z</published><updated>2022-09-22T17:00:47.456Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img1.teletype.in/files/09/55/0955ef78-e888-4859-a27b-330533aa3edc.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img1.teletype.in/files/00/e3/00e3ca4f-bf95-4288-b5ca-76abb85c52c5.png&quot;&gt;Optus has suffered a massive cyber-attack, with the personal information of customers stolen, including names, dates of birth, addresses, and contact details.</summary><content type="html">
  &lt;figure id=&quot;Z0rM&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/00/e3/00e3ca4f-bf95-4288-b5ca-76abb85c52c5.png&quot; width=&quot;751&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;6YqY&quot;&gt;Optus has suffered a massive cyber-attack, with the personal information of customers stolen, including names, dates of birth, addresses, and contact details.&lt;/p&gt;
  &lt;p id=&quot;Ovqu&quot;&gt;Optus suffered the data breach when hackers, believed to be working for a criminal or state-sponsored organization, accessed the sensitive information by breaking through the company’s firewall.&lt;/p&gt;
  &lt;p id=&quot;Ka4a&quot;&gt;The Australian Cyber Security Centre is working with Optus to lock down its systems, secure any data against further breaches, and trace the attackers. The Australian federal police and the Office of the Australian Information Commissioner have also been notified.&lt;/p&gt;
  &lt;p id=&quot;QC0C&quot;&gt;Optus has 9.7 million subscribers, according to publicly available data, but the company said it was still assessing the size of the data breach.&lt;/p&gt;
  &lt;p id=&quot;TJDY&quot;&gt;The firm confirmed information which may have been exposed included Optus customers’ names, dates of birth, phone numbers, email addresses and, for a cohort of customers, physical addresses and identification document numbers such as driving licence or passport numbers.&lt;/p&gt;
  &lt;p id=&quot;erpA&quot;&gt;Optus said payment details and account passwords have not been compromised, and that services, including mobile phones and home internet, were not affected.&lt;/p&gt;
  &lt;p id=&quot;omZb&quot;&gt;The company insisted voice calls had not been compromised, and that Optus services remained safe to use and operate:&lt;/p&gt;
  &lt;blockquote id=&quot;F3sg&quot;&gt;We are devastated to discover that we have been subject to a cyber-attack that has resulted in the disclosure of our customers’ personal information to someone who shouldn’t see it.&lt;/blockquote&gt;
  &lt;blockquote id=&quot;umVf&quot;&gt;We are very sorry and understand customers will be concerned. Please be assured that we are working hard, and engaging with all the relevant authorities and organizations, to help safeguard our customers as much as possible.&lt;/blockquote&gt;
  &lt;p id=&quot;nYJB&quot;&gt;Recently, &lt;a href=&quot;https://hackingnews.live/jgmdm-vXkag&quot; target=&quot;_blank&quot;&gt;American Airlines notified customers of a recent data breach&lt;/a&gt; after hackers compromised an undisclosed number of employee email accounts and gained access to sensitive personal information.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:jgmdm-vXkag</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/jgmdm-vXkag?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>American Airlines suffers data leak, sensitive info exposed</title><published>2022-09-20T17:24:22.143Z</published><updated>2022-09-20T17:24:22.143Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img3.teletype.in/files/25/37/25371f96-a5ce-490e-8af6-0634754a7027.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img1.teletype.in/files/c4/24/c42407ce-9abe-46cb-99c3-cda19d5c5fa0.png&quot;&gt;American Airlines has notified customers of a recent data breach after hackers compromised an undisclosed number of employee email accounts and gained access to sensitive personal information.</summary><content type="html">
  &lt;figure id=&quot;2CN8&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/c4/24/c42407ce-9abe-46cb-99c3-cda19d5c5fa0.png&quot; width=&quot;752&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;46un&quot;&gt;American Airlines has notified customers of a recent data breach after hackers compromised an undisclosed number of employee email accounts and gained access to sensitive personal information.&lt;/p&gt;
  &lt;p id=&quot;kTEO&quot;&gt;In notification letters sent on Sept. 16, the airline explained that it has no evidence that the exposed data was misused. &lt;/p&gt;
  &lt;p id=&quot;wR1Z&quot;&gt;American Airlines disclosed the data breach on July 5, immediately secured the impacted email accounts, and hired a cybersecurity forensic firm to investigate the security incident:&lt;/p&gt;
  &lt;blockquote id=&quot;sGol&quot;&gt;In July 2022 we discovered that an unauthorized actor compromised the email accounts of a limited number of American Airlines team members.&lt;/blockquote&gt;
  &lt;blockquote id=&quot;5ykm&quot;&gt;Upon discovery of the incident, we secured the applicable email accounts and engaged a third party cybersecurity forensic firm to conduct a forensic investigation to determine the nature and the scope of the incident.&lt;/blockquote&gt;
  &lt;p id=&quot;bv1T&quot;&gt;Personal information exposed in the hacker attack and potentially accessed by the attackers may have included: &lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;ul id=&quot;fZdG&quot;&gt;
      &lt;li id=&quot;BXjA&quot;&gt;Employees&amp;#x27; and customers&amp;#x27; names, &lt;/li&gt;
      &lt;li id=&quot;aU6j&quot;&gt;Dates of birth, &lt;/li&gt;
      &lt;li id=&quot;LNTh&quot;&gt;Home addresses, &lt;/li&gt;
      &lt;li id=&quot;p1pn&quot;&gt;Phone numbers, &lt;/li&gt;
      &lt;li id=&quot;NxeO&quot;&gt;Email addresses, &lt;/li&gt;
      &lt;li id=&quot;pRPQ&quot;&gt;Driver&amp;#x27;s license numbers, &lt;/li&gt;
      &lt;li id=&quot;UCdn&quot;&gt;Passport numbers or certain medical information.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;p id=&quot;W9aH&quot;&gt;The other day, &lt;a href=&quot;/fEPf682kFIP&quot;&gt;Starbucks reported its customer database was breached online&lt;/a&gt;, with local media reporting that 200,000 individual&amp;#x27;s information was stolen.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:N_JfeIgreJ0</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/N_JfeIgreJ0?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>Revolut data breach exposed info of 50,000 users</title><published>2022-09-19T18:17:55.170Z</published><updated>2022-09-19T18:17:55.170Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img1.teletype.in/files/0c/e3/0ce35f6d-bd76-4d95-b722-366780d8b133.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img1.teletype.in/files/04/54/04544ee3-5fec-4705-bbba-9d1d7c7ea936.png&quot;&gt;Revolut has been hit by a hacker attack that gave an unauthorized third party access to personal information of tens of thousands of clients.</summary><content type="html">
  &lt;figure id=&quot;XMxK&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/04/54/04544ee3-5fec-4705-bbba-9d1d7c7ea936.png&quot; width=&quot;748&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;5sII&quot;&gt;Revolut has been hit by a hacker attack that gave an unauthorized third party access to personal information of tens of thousands of clients.&lt;/p&gt;
  &lt;p id=&quot;W8Gt&quot;&gt;&lt;em&gt;Founded in 2015, Revolut is a financial technology company that has seen a rapid growth, now offering banking, money management, and investment services to customers all over the world.&lt;/em&gt;&lt;/p&gt;
  &lt;p id=&quot;d3FX&quot;&gt;The data security incident occurred a week ago, on Sept. 17, and has been described as &amp;quot;highly targeted.&amp;quot;&lt;/p&gt;
  &lt;p id=&quot;LVXe&quot;&gt;A company spokesperson reported that an unauthorized party had access &amp;quot;for a short period of time&amp;quot; to details of only a 0.16% of its customers:&lt;/p&gt;
  &lt;blockquote id=&quot;P3l7&quot;&gt;We immediately identified and isolated the attack to effectively limit its impact and have contacted those customers affected. Customers who have not received an email have not been impacted.&lt;/blockquote&gt;
  &lt;p id=&quot;WoU8&quot;&gt;According to the breach disclosure to the State Data Protection Inspectorate in Lithuania, where Revolut has a banking license, 50,150 customers have been impacted.&lt;/p&gt;
  &lt;p id=&quot;FQmd&quot;&gt;The Lithuanian data protection agency notes that the likely exposed information includes:&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;ul id=&quot;N7L8&quot;&gt;
      &lt;li id=&quot;Nj8d&quot;&gt;Email addresses,&lt;/li&gt;
      &lt;li id=&quot;26r2&quot;&gt;Full names,&lt;/li&gt;
      &lt;li id=&quot;1QAk&quot;&gt;Postal addresses,&lt;/li&gt;
      &lt;li id=&quot;sSbM&quot;&gt;Phone numbers,&lt;/li&gt;
      &lt;li id=&quot;4Ves&quot;&gt;Limited payment card data,&lt;/li&gt;
      &lt;li id=&quot;0g8o&quot;&gt;Account data.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;p id=&quot;oDBX&quot;&gt;The other day, &lt;a href=&quot;https://hackingnews.live/fEPf682kFIP&quot; target=&quot;_blank&quot;&gt;Starbucks reported its customer database was breached online&lt;/a&gt;, with local media reporting that 200,000 individual&amp;#x27;s information was stolen.&lt;/p&gt;

</content></entry><entry><id>peterbrooks:fEPf682kFIP</id><link rel="alternate" type="text/html" href="https://teletype.in/@peterbrooks/fEPf682kFIP?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=peterbrooks"></link><title>Starbucks Singapore reported data breach</title><published>2022-09-19T18:10:06.776Z</published><updated>2022-09-19T18:10:06.776Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img4.teletype.in/files/f7/08/f708fc7f-ef52-4a82-8419-715f5899bc6f.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img1.teletype.in/files/ce/eb/ceeb54e8-129d-4019-bdf0-99142398cbab.png&quot;&gt;On Sept. 16, Starbucks Singapore reported its customer database was breached online, with local media reporting that 200,000 individual's information was stolen.</summary><content type="html">
  &lt;figure id=&quot;BXtP&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/ce/eb/ceeb54e8-129d-4019-bdf0-99142398cbab.png&quot; width=&quot;743&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;9TKV&quot;&gt;On Sept. 16, Starbucks Singapore reported its customer database was breached online, with local media reporting that 200,000 individual&amp;#x27;s information was stolen.&lt;/p&gt;
  &lt;p id=&quot;M8bz&quot;&gt;The coffee chain said in an email to customers that it had discovered some unauthorized access to details such as:&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;ul id=&quot;noZN&quot;&gt;
      &lt;li id=&quot;6tFQ&quot;&gt;Full names, &lt;/li&gt;
      &lt;li id=&quot;R2tO&quot;&gt;Gender, &lt;/li&gt;
      &lt;li id=&quot;jFTu&quot;&gt;Dates of birth, &lt;/li&gt;
      &lt;li id=&quot;nsRg&quot;&gt;Phone numbers,&lt;/li&gt;
      &lt;li id=&quot;tWTo&quot;&gt;Home addresses.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;blockquote id=&quot;DXyx&quot;&gt;Relevant authorities have been informed and Starbucks Singapore is assisting them on this matter.&lt;/blockquote&gt;
  &lt;p id=&quot;JFQw&quot;&gt;The firm said it was made aware of the breach on Sept. 13, and that no credit card details were taken as it does not store them.&lt;/p&gt;
  &lt;p id=&quot;eV8z&quot;&gt;Starbucks urged customers to reset their passwords.&lt;/p&gt;
  &lt;p id=&quot;f3i9&quot;&gt;Recently, one of the biggest pharmaceutical companies in India &lt;a href=&quot;https://hackingnews.live/yye-i-CTG6E&quot; target=&quot;_blank&quot;&gt;IPCA Laboratories became a victim of a ransomware operation&lt;/a&gt; that claims to have stolen 500 GB of data.&lt;/p&gt;

</content></entry></feed>