Plusnet customers SWAMPED by spam but BT-owned ISP dismisses data breach claims

Refuses to notify watchdog despite subscribers' fears

BT-owned ISP Plusnet has rebuffed concerns from customers who are worried that their email accounts have been compromised by spammers.

Despite the protests, at time of writing, Sheffield-based Plusnet was yet to turn itself into the UK's data watchdog – even just as a symbolic gesture to placate subscribers who fear that a possible data breach had occurred.

Register reader Simon tipped us off about what some suspected was a security gaffe on Plusnet's email system. He told us:

On 14th November a number of Plusnet customers started receiving marketing emails from a US company on email addresses they have given to Plusnet for billing purposes.

These customers say they have never given these email addresses to anyone else and are not receiving the same marketing messages to any other email address.

The only apparent conclusion is someone has obtained the billing email addresses of Plusnet customers.

However, despite a 14-page-long discussion thread on the telco's support forum, Plusnet has refused to accept responsibility for the spam attack.

Simon noted to El Reg: "As an ISP, they have an obligation to report data losses to the Information Commissioner's Office [ICO] and are currently refusing. Not a very responsible attitude on their part, given they are meant to be the cuddly face of internet access."

Indeed, we contacted Britain's information cops to flag up the complaints about a possible data gaffe at Plusnet.

An ICO spokesman told The Reg:

Under the Privacy and Electronic Communications Regulations, organisations who provide a service allowing members of the public to send electronic messages (eg telecoms providers or internet service providers) are required to notify us if a personal data breach occurs within 24 hours of becoming aware of the essential facts of the breach.

He added: "If a person still believes that the company has failed to look after their information then they should raise their concerns with Plusnet in the first instance. If they are not satisfied with the company’s response then they can raise the issue with our office providing any supporting evidence that they have, including details of the company’s response."

The ISP has posted an official response to its customers on its support forum. It said:

Plusnet has conducted a thorough investigation into this issue. Our investigations confirm that Plusnet’s Core Systems and Networks, including our subscriber and billing databases, have been verified and we are comfortable there has been no compromise.

Plusnet takes its obligations regarding our customer data very seriously – we ensure we comply with the guidance of the data protection regulator as well as the requirements of the Data Protection Act. All companies that Plusnet work with are required to ensure data is processed securely and in accordance with the Data Protection Act.

Plusnet will continue to monitor its security controls to ensure all data, including customer data, is protected. If we have any further updates on this we will of course let you know.

However, despite being approached by The Register on Friday morning, the company was yet to respond with comment. We were hoping Plusnet would explain why it hadn't reported the matter to the ICO, given the concerns from customers who feared their data has been compromised.

El Reg was told by a company spokeswoman that Plusnet was "looking into this as a matter of priority."

Back on the firm's forum, the ISP's staffer Bob Pullen has been fielding the customer complaints. Among other things, he was asked if Plusnet had contacted the UK's data cops yet. Pullen responded with this humdinger:

The decision to report matters to the ICO lies with out legal and compliance teams. I'm no legal expert (and don't get me wrong, I recognise some of the observations from you guys speak for themselves) but I'm not 100 per cent sure something like this would qualify. Not without explicit and quantifiable evidence that shows one of our systems to have been compromised, something we're almost certain hasn't happened.

That's right, folks, Plusnet is "almost certain" it's in the clear. So you can all rest easy now, right? ®

Other stories you might like

  • Millions of people's info stolen from MGM Resorts dumped on Telegram for free
    Meanwhile, Twitter coughs up $150m after using account security contact details for advertising

    Miscreants have dumped on Telegram more than 142 million customer records stolen from MGM Resorts, exposing names, postal and email addresses, phone numbers, and dates of birth for any would-be identity thief.

    The vpnMentor research team stumbled upon the files, which totaled 8.7 GB of data, on the messaging platform earlier this week, and noted that they "assume at least 30 million people had some of their data leaked." MGM Resorts, a hotel and casino chain, did not respond to The Register's request for comment.

    The researchers reckon this information is linked to the theft of millions of guest records, which included the details of Twitter's Jack Dorsey and pop star Justin Bieber, from MGM Resorts in 2019 that was subsequently distributed via underground forums.

    Continue reading
  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Google keeps legacy G Suite alive and free for personal use

    Google has quietly dropped its demand that users of its free G Suite legacy edition cough up to continue enjoying custom email domains and cloudy productivity tools.

    This story starts in 2006 with the launch of “Google Apps for Your Domain”, a bundle of services that included email, a calendar, Google Talk, and a website building tool. Beta users were offered the service at no cost, complete with the ability to use a custom domain if users let Google handle their MX record.

    The service evolved over the years and added more services, and in 2020 Google rebranded its online productivity offering as “Workspace”. Beta users got most of the updated offerings at no cost.

    Continue reading
  • Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware
    Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D

    Analysis Wizard Spider, the Russia-linked crew behind high-profile malware Conti, Ryuk and Trickbot, has grown over the past five years into a multimillion-dollar organization that has built a corporate-like operating model, a year-long study has found.

    In a technical report this week, the folks at Prodaft, which has been tracking the cybercrime gang since 2021, outlined its own findings on Wizard Spider, supplemented by info that leaked about the Conti operation in February after the crooks publicly sided with Russia during the illegal invasion of Ukraine.

    What Prodaft found was a gang sitting on assets worth hundreds of millions of dollars funneled from multiple sophisticated malware variants. Wizard Spider, we're told, runs as a business with a complex network of subgroups and teams that target specific types of software, and has associations with other well-known miscreants, including those behind REvil and Qbot (also known as Qakbot or Pinkslipbot).

    Continue reading

Biting the hand that feeds IT © 1998–2022