Telstra Opticomm customer data exposed in leaked file

Telstra fined $1.5 million after breaching scam rules

Telstra Opticomm customer data exposed in leaked file

Thousands of Telstra customers’ data was exposed after a leaked file appeared on infamous hacking forum BreachForum.

As originally reported whistle, Details of approximately 3,000 Telstra customers with Opticomm-based broadband services were contained in the file which the leaker said contained 47,281 rows of data.

“Today I publish the Opticomm Orders database for you to download,” said leaker “abyss0.”

“In 2023/2024, Opticomm was breached by a server, resulting in information about customer appointments being leaked.”

According to the hacker, the data includes contact names, email addresses, mobile numbers, billing account IDs, and more. According IT news, Much of the data in the file is fictitious data.

For context, Opticomm is a telecommunications provider owned by Uniti, known for building fiber networks in new housing estates, and is a rival to NBN.

Opticomm services are sold by a number of different internet providers including Aussie Broadband, Exetel, iiNet, Superloop and of course Telstra.

Speaking to the media, a Telstra spokesperson said the company was aware of the breach and was taking action.

“We are aware that the published data file includes a combination of customer names, email addresses and telephone numbers of approximately 3,000 Telstra customers on the Opticomm network,” the spokesperson said.

“We are in the process of contacting all affected customers and offering support from IDCare, Australia’s national identity and cyber security community support service.

“We are working closely with Opticomm to investigate how the data was accessed and notify the relevant authorities.”

Opticomm also issued a statement saying it is working with Telstra to “investigate the breach and take appropriate action”.

Several other Opticomm providers, including Aussie Broadband, Superloop and Exetel, have confirmed that their customers were not affected by the breach.

Leave a Reply

Your email address will not be published. Required fields are marked *