By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Artificial Intelligence | CRMArtificial Intelligence | CRM
Notification
Latest News
Writing a Research Paper
Writing a Research Paper
Research Paper
Buy Bitcoins
How to Buy Bitcoins, Near Me
Finance
Cyber Security
Why Cyber Security is a Must?
Cyber Security
Cyber Security
What is Cyber Security?
Cyber Security
Human Resources
What Is Human Resources (HR)? Description, Duties, and Jobs
Human Resource
Aa
  • Software
    • CRM
    • Cloud Storage
    • Cyber Security
    • Networking
  • Artificial Intelligence
  • Finance
  • Research Paper
  • Healthcare
  • Human Resource
  • Contact Center
  • Phone System
Reading: Who is the attacker?
Share
Artificial Intelligence | CRMArtificial Intelligence | CRM
Aa
  • Beauty
  • Model
  • Lifestyle
Search
  • Software
    • CRM
    • Cloud Storage
    • Cyber Security
    • Networking
  • Artificial Intelligence
  • Finance
  • Research Paper
  • Healthcare
  • Human Resource
  • Contact Center
  • Phone System
Have an existing account? Sign In
Follow US
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Artificial Intelligence | CRM > Blog > Software > Cyber Security > Who is the attacker?
Cyber Security

Who is the attacker?

vipnak
Last updated: 2022/09/29 at 6:22 AM
By vipnak 8 months ago
Share
6 Min Read
cyber attacks today, cyber attacks examples, cyber attack or cyberattack, biggest cyber attacks in history, famous cyber attacks, cyber attack 2022, how to prevent cyber attacks, what is a cyber attack in war, 4 types of cyber attacks, cyber attacks examples, how to prevent cyber attacks, 4 types of cyber attacks, cyber attacks today, biggest cyber attacks in history, types of cyber attacks pdf, cyber terrorism attacks, what is a cyber attack in war, recent cyber attacks in 2022, cyber attacks examples, cyber attacks today, biggest cyber attacks in history, famous cyber attacks, real-life examples of cyber attacks, cyber terrorism, cyber terrorism examples, cyber security course, cyber security salary, cyber security jobs, cyber security pdf, cyber security degree, cyber security companies, cyber security certifications, cyber security - wikipedia,
SHARE

Who is the attacker? How was the data accessed? What was taken? Digital security experts explain.

Contents
Who is the attacker?Who has the data?Why did the attacker back down?How was the data accessed?What data was taken?How common is this method of attack?What happens next?

In the week since Optus announced it had been the subject of a massive data breach with as many as 10 million customer accounts exposed, solid information about what actually happened has been scarce.

Here’s what we know so far.

Who is the attacker?

Optus has said it was the target of a “sophisticated attack”.

The only person to come forward since then, claiming to have the data is a user called “Optusdata” on a data breach forum. The alleged attacker threatened to sell the data unless Optus paid US$1m in cryptocurrency.

The user later posted what they alleged was 10,000 customer records, before deleting the posts and apologising.

Nothing is known about this person beyond what was on the forum.

Who is the attacker?

Who has the data?

It is not clear whether “Optusdata” is the person responsible for the attack, or whether they are the only person who has access to the data.

In their apology, “Optusdata” claimed they had deleted the only copy they had of the data.

There is no way to verify this. Other attackers could have accessed the data via the same vulnerability, and the data may not have actually been deleted.

“That’s a valid concern as all we have to go on at present is the word of a criminal who had no hesitation to dump more than 10,000 records publicly,” cyber security expert and founder of the website HaveIBeenPwned, Troy Hunt, said.

“Plus, the vulnerability as it’s been described is so trivial it’s entirely possible it was exploited by other parties as well.”

Why did the attacker back down?

That also remains unclear. Optus has said it did not pay the ransom.

Hunt lists data breaches on his website to allow people to check whether their personal information has been compromised. He said ransom demands were not unusual for large data breaches such as that suffered by Optus, but the alleged attacker’s change of heart was unexpected.

“Seeing the hacker back down, apologise and promise to delete the data is very rare. I suspect the amount of exposure the incident received plus the AFP involvement and commentary from high-level politicians spooked them,” he said.

How was the data accessed?

Reports suggest Optus had an application programming interface (API) available online that did not require authorisation or authentication to access customer data.

“In the instance, where a public API endpoint did not require authentication, anyone on the internet with knowledge of that endpoint [URL] could use it,” said senior manager of cyber security consulting for Moss Adams, Corey J Ball.

“If that endpoint was used to access customer data, then anyone on the internet could have used that endpoint to gather customer data.

“Without technical controls for authentication and authorisation in place, any user could have requested any other user’s information. The attacker likely scripted the process to repeat requests from the endpoint until they had collected millions of instances of personally identifiable information.

Optus still hasn’t confirmed how the data was accessed. It maintains the attack was sophisticated, but the home affairs minister, Claire O’Neil, has said the vulnerability was akin to Optus leaving a window open.

What data was taken?

Optus says the stolen data includes names, email addresses, postal addresses, phone numbers, dates of birth, and for a portion of the affected customers, identification numbers including passport numbers, driver’s licence numbers and Medicare numbers.

The dump of records released by the forum user contained all this information.

How common is this method of attack?

“Unfortunately, it can be pretty common,” Josh Lemon, a digital forensics and cyber incident expert at SANS Institute, said.

But he said attackers tended to not target a single organisation. They usually scan across the internet looking for known vulnerabilities and exploiting those vulnerabilities all at once, he said.

“So for a threat actor to specifically just go after [one company] is a little bit unique in that sense.”

What happens next?

Optus customers have been urged to stay vigilant for signs their data has been compromised. State and federal governments are making it easier for those affected to replace identity documents that may have been accessed.

While the alleged attacker has dropped the ransom threat, the criminal investigation is ongoing. The Australian federal police are working with law enforcement authorities overseas, including the Federal Bureau of Investigation in the US, to locate whoever obtained the data, and who tried to sell it.

The federal government is looking at urgent reform in this area, including making it easier to alert banks to which of their customers may have been compromised. It is also considering large fines for companies that allow such a breach to occur.

You Might Also Like

Why Cyber Security is a Must?

What is Cyber Security?

Optus: How a massive data breach has exposed Australia

Cyber attack Campaign Targets Military Contractors

TAGGED: 4 types of cyber attacks, biggest cyber attacks in history, cyber attack 2022, cyber attack or cyberattack, cyber attacks examples, cyber attacks today, cyber security - wikipedia, cyber security certifications, cyber security companies, cyber security course, cyber security degree, cyber security jobs, cyber security pdf, cyber security salary, cyber terrorism, cyber terrorism attacks, cyber terrorism examples, famous cyber attacks, how to prevent cyber attacks, optus class action, optus cyber attack, optus cyber attack am i affected, optus cyber attack cause, optus cyber attack check, optus cyber attack class action, optus cyber attack details, optus cyber attack how do i know, optus cyber attack today, optus cyber attack what should i do, optus cyber attack what to do, optus data breach how to check, optus hacker, optus hacker apology, real-life examples of cyber attacks, recent cyber attacks in 2022, types of cyber attacks pdf, what is a cyber attack in war
vipnak September 29, 2022
Share this Article
Facebook Twitter Email Print
Share
Previous Article cyber Cyber attack Campaign Targets Military Contractors
Next Article optus Optus: How a massive data breach has exposed Australia
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Artificial Intelligence | CRMArtificial Intelligence | CRM
Follow US

Design By Vipn akITES All Right Reseved

crm agencies
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

[mc4wp_form]
Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
crm agencies
Welcome Back!

Sign in to your account

Lost your password?