Sydney Resident Punished for Extorting Optus Clients Following Data Infringement

A man from Sydney has been given an 18-month Community Correction Order and 100 hours of community service for attempting to exploit the Optus data breach that happened last year. The man, who was 19 when he was arrested in October 2022 and is now 20, took advantage of the stolen records from the security breach to carry out an SMS-based extortion scheme. He sent messages to 92 people whose information was part of a larger group of 10,200 records that were briefly posted on a criminal forum in September 2022. The Australian Federal Police, which started Operation Guardian after the breach, said that none of the affected customers paid the demanded amount. After his arrest, the offender pleaded guilty in November 2022 to two counts of using a telecommunications network with the intention of committing a serious offense. The AFP Commander Chris Goldsmid said that the criminal use of stolen data is a serious offense and has the potential to cause a lot of harm to the community. Last year, Optus suffered a major hack, with passport information and Medicare numbers of almost 2.1 million of its current and former customers being exposed.

This Cyber News was published on thehackernews.com. Publication date: Wed, 08 Feb 2023 15:50:03 +0000


Cyber News related to Sydney Resident Punished for Extorting Optus Clients Following Data Infringement

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 week ago Aws.amazon.com
Australian Telecom Watchdog Sues Optus Over 2022 Data Breach - The Australian Communications and Media Authority said it has filed proceedings against Optus in a federal court as the company failed to protect sensitive customer data during a data breach in September 2022 that affected close to 10 million people. ...
4 months ago Bankinfosecurity.com
Sydney Resident Punished for Extorting Optus Clients Following Data Infringement - A man from Sydney has been given an 18-month Community Correction Order and 100 hours of community service for attempting to exploit the Optus data breach that happened last year. The man, who was 19 when he was arrested in October 2022 and is now ...
1 year ago Thehackernews.com
CVE-2019-5303 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
10 months ago
CVE-2019-5302 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
10 months ago
Cyber Mayday and My Journey to Oz - Here's a story of how pandemic disappointments and travel problems led to new professional opportunities. The home to exotic animals, the rugged outback and fireworks over the Sydney Opera House as the world ushers in a new year. Then - you guessed ...
7 months ago Securityboulevard.com
An Australian Person Receives Punishment for Fraud Involving Optus Security Breach - This week, Australian authorities sentenced a Sydney man for attempting to extort money from Optus customers using data stolen during a September 2022 data breach. The breach resulted in the theft of personal information belonging to 9.8 million ...
1 year ago Securityweek.com
Marketing Strategies for PaaS Services: Get Ahead of the Curve - With the ever-growing demand for cloud-based performance and services, Platform-as-a-Service (PaaS) is becoming increasingly critical for modern software development. PaaS is a cloud-based platform, providing businesses with an integrated suite of ...
1 year ago Hackread.com
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
6 months ago Cisa.gov
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
6 months ago Cisa.gov
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
6 months ago Feeds.dzone.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
6 months ago Venturebeat.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Seattle cancer center confirms cyberattack after ransomware gang threats - A prominent cancer center based in Seattle is dealing with a cyberattack claimed by a notorious cybercrime gang that currently appears to be extorting the healthcare facility. On Friday morning, the Hunters International ransomware group listed the ...
9 months ago Therecord.media
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
10 months ago Helpnetsecurity.com
New phishing attack steals your Instagram backup codes to bypass 2FA - A new phishing campaign pretending to be a 'copyright infringement' email attempts to steal the backup codes of Instagram users, allowing hackers to bypass the two-factor authentication configured on the account. Two-factor authentication is a ...
9 months ago Bleepingcomputer.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
6 months ago Feeds.dzone.com
Phishing Campaign Targets Instagram Users, Steals Backup Codes and Circumvent 2FA Protection - A recent phishing scheme has emerged, posing as a 'copyright infringement' email to deceive Instagram users and pilfer their backup codes. These codes, integral for the recovery of accounts, are used to circumvent the two-factor authentication ...
9 months ago Cysecurity.news
Australian Organisations Face Tensions Between Personalisation, Privacy - Organisations in Australia face a significant challenge with data. Consumers are willing to share their data if it means better personalisation. On the other hand, there is a real concern about privacy, and while organisations are focused on looking ...
8 months ago Techrepublic.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
9 months ago Securityboulevard.com
EFF Reminds the Supreme Court That Copyright Trolls Are Still a Problem - At EFF, we spend a lot of time calling out the harm caused by copyright trolls and protecting internet users from their abuses. Copyright trolls are serial plaintiffs who use search tools to identify technical, often low-value infringements on the ...
10 months ago Eff.org
More Than a Decade Later, Site-Blocking Is Still Censorship - We're taking part in Copyright Week, a series of actions and discussions supporting key principles that should guide copyright policy. Every day this week, various groups are taking on different elements of copyright law and policy, addressing what's ...
8 months ago Eff.org
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
9 months ago Securityzap.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
10 months ago Microsoft.com
Developing Software Applications Under the Guidance of Data-Driven Decision-Making Principles - To architect and cultivate an application that yields precise outputs in alignment with business requirements, paramount emphasis must be given to the foundational data and the pertinent data scenarios shaping the application. Software application ...
8 months ago Feeds.dzone.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)