Sydney Resident Punished for Extorting Optus Clients Following Data Infringement

A man from Sydney has been given an 18-month Community Correction Order and 100 hours of community service for attempting to exploit the Optus data breach that happened last year. The man, who was 19 when he was arrested in October 2022 and is now 20, took advantage of the stolen records from the security breach to carry out an SMS-based extortion scheme. He sent messages to 92 people whose information was part of a larger group of 10,200 records that were briefly posted on a criminal forum in September 2022. The Australian Federal Police, which started Operation Guardian after the breach, said that none of the affected customers paid the demanded amount. After his arrest, the offender pleaded guilty in November 2022 to two counts of using a telecommunications network with the intention of committing a serious offense. The AFP Commander Chris Goldsmid said that the criminal use of stolen data is a serious offense and has the potential to cause a lot of harm to the community. Last year, Optus suffered a major hack, with passport information and Medicare numbers of almost 2.1 million of its current and former customers being exposed.

This Cyber News was published on thehackernews.com. Publication date: Wed, 08 Feb 2023 15:50:03 +0000


Cyber News related to Sydney Resident Punished for Extorting Optus Clients Following Data Infringement

Australian Telecom Watchdog Sues Optus Over 2022 Data Breach - The Australian Communications and Media Authority said it has filed proceedings against Optus in a federal court as the company failed to protect sensitive customer data during a data breach in September 2022 that affected close to 10 million people. ...
8 months ago Bankinfosecurity.com
Sydney Resident Punished for Extorting Optus Clients Following Data Infringement - A man from Sydney has been given an 18-month Community Correction Order and 100 hours of community service for attempting to exploit the Optus data breach that happened last year. The man, who was 19 when he was arrested in October 2022 and is now ...
1 year ago Thehackernews.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
3 months ago Aws.amazon.com
CVE-2019-5303 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
1 year ago
CVE-2019-5302 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
1 year ago
Cyber Mayday and My Journey to Oz - Here's a story of how pandemic disappointments and travel problems led to new professional opportunities. The home to exotic animals, the rugged outback and fireworks over the Sydney Opera House as the world ushers in a new year. Then - you guessed ...
11 months ago Securityboulevard.com
An Australian Person Receives Punishment for Fraud Involving Optus Security Breach - This week, Australian authorities sentenced a Sydney man for attempting to extort money from Optus customers using data stolen during a September 2022 data breach. The breach resulted in the theft of personal information belonging to 9.8 million ...
1 year ago Securityweek.com
Marketing Strategies for PaaS Services: Get Ahead of the Curve - With the ever-growing demand for cloud-based performance and services, Platform-as-a-Service (PaaS) is becoming increasingly critical for modern software development. PaaS is a cloud-based platform, providing businesses with an integrated suite of ...
2 years ago Hackread.com
Seattle cancer center confirms cyberattack after ransomware gang threats - A prominent cancer center based in Seattle is dealing with a cyberattack claimed by a notorious cybercrime gang that currently appears to be extorting the healthcare facility. On Friday morning, the Hunters International ransomware group listed the ...
1 year ago Therecord.media
New phishing attack steals your Instagram backup codes to bypass 2FA - A new phishing campaign pretending to be a 'copyright infringement' email attempts to steal the backup codes of Instagram users, allowing hackers to bypass the two-factor authentication configured on the account. Two-factor authentication is a ...
1 year ago Bleepingcomputer.com
Phishing Campaign Targets Instagram Users, Steals Backup Codes and Circumvent 2FA Protection - A recent phishing scheme has emerged, posing as a 'copyright infringement' email to deceive Instagram users and pilfer their backup codes. These codes, integral for the recovery of accounts, are used to circumvent the two-factor authentication ...
1 year ago Cysecurity.news
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
10 months ago Cisa.gov
EFF Reminds the Supreme Court That Copyright Trolls Are Still a Problem - At EFF, we spend a lot of time calling out the harm caused by copyright trolls and protecting internet users from their abuses. Copyright trolls are serial plaintiffs who use search tools to identify technical, often low-value infringements on the ...
1 year ago Eff.org
More Than a Decade Later, Site-Blocking Is Still Censorship - We're taking part in Copyright Week, a series of actions and discussions supporting key principles that should guide copyright policy. Every day this week, various groups are taking on different elements of copyright law and policy, addressing what's ...
1 year ago Eff.org
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
10 months ago Cisa.gov
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
10 months ago Feeds.dzone.com
Australian Organisations Face Tensions Between Personalisation, Privacy - Organisations in Australia face a significant challenge with data. Consumers are willing to share their data if it means better personalisation. On the other hand, there is a real concern about privacy, and while organisations are focused on looking ...
1 year ago Techrepublic.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
10 months ago Venturebeat.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
2 years ago Tripwire.com
CVE-2023-52568 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
1 year ago Helpnetsecurity.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
10 months ago Feeds.dzone.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
1 year ago Securityboulevard.com
Tipalti investigates claims of data stolen by ransomware gang - Tipalti says they are investigating claims that the ALPHV ransomware gang breached its network and stole 256 GB of data, including data for Roblox and Twitch. Tipalti offers technology solutions for accounting, payment processing, eCommerce, and ...
1 year ago Bleepingcomputer.com
Tipalti investigates claims of data stolen in ransomware attack - Tipalti says they are investigating claims that the ALPHV ransomware gang breached its network and stole 256 GB of data, including data for Roblox and Twitch. Tipalti offers technology solutions for accounting, payment processing, eCommerce, and ...
1 year ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)