CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Incidents

TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hack

December 14, 2022
Reading Time: 2 mins read
in Incidents

 

Telecommunications giant TPG has revealed an email-hosting service used by up to 15,000 iiNet and Westnet business customers has been breached, with the hacker looking for cryptocurrency and other financial information.

TPG said in a release to the Australian Securities Exchange (ASX) on Wednesday that cybersecurity firm Mandiant had found evidence of unauthorised access to a Hosted Exchange service used by iiNet and Westnet business customers.

A Hosted Exchange service is a Microsoft product that is operated by iiNet and Westnet to provide email services to customers – typically as part of a bundle of business or home broadband services.

TPG said initial analysis of the activity on the service showed the aim of the threat actor was to search for customers’ cryptocurrency and financial information.

The company has not said what might have been obtained in the attack, but an investigation is under way and affected customers will be advised.

TPG told the ASX the breach did not affect mobile or broadband services, and access has been cut off for the attacker.

 

READ FULL ARTICLE

Tags: ASXAustraliaAustralian Securities ExchangeCryptocurrencyData BreachData stolenDecember 2022Financial dataiiNetincidentsIncidents 2022TelecommunicationsTPGUnauthorized accessWestnet
0
VIEWS
ADVERTISEMENT

Related Posts

Hackers auction alleged source code for League of Legends

Hackers auction alleged source code for League of Legends

January 26, 2023
U.S. Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software

U.S. Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software

January 26, 2023
Reported Data Breaches in US Reach Near-Record Highs

Reported Data Breaches in US Reach Near-Record Highs

January 26, 2023
2 Hacks Involving Mental Health Data Affected Nearly 400,000

2 Hacks Involving Mental Health Data Affected Nearly 400,000

January 26, 2023

More Articles

Alerts

[Control Systems] ABB Security Advisory

October 26, 2021
Book

Pro ASP.NET Web API Security: Securing ASP.NET Web API

April 21, 2022

Industrial IoT Spotlight Podcast

March 7, 2022
Incidents

Norton LifeLock says thousands of customer accounts breached

January 16, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.