TalkTalk claims 157,000 customers were victims of security breach

Cheapo telco revises down attack figure, shares climb 4%

TalkTalk has once again attempted to downplay the seriousness of the attack on its systems by claiming on Friday morning that only four per cent of its customers – nearly 157,000 people – were affected by the security breach.

The budget ISP said that bank account numbers and sort codes of 15,656 of its subscribers had been swiped in the attack.

It added that 28,000 "obscured credit and debit card numbers" had been nicked, but claimed they "cannot be used for financial transactions, and were 'orphaned', meaning that customers cannot be identified by the stolen data."

Of the total 156,959 customers that TalkTalk claimed had been directly hit in the attack, 113,303 people had "sensitive personal data" stolen but their bank details were not targeted, the telco said.

Throughout TalkTalk's statement, the company reiterated its claim that the "financial information" pilfered during the security breach "cannot on its own lead to financial loss".

However, faith in the firm's ability to handle customer data has hit an all-time low.

As noted by analysts at Megabuyte, shares in TalkTalk are currently trading down 30 per cent since it was revealed that ISP's systems had been violated by attackers.

"TalkTalk now faces serious questions over its security protocols. Indeed, this episode serves as a timely reminder to all corporations that cyber-attacks are becoming more frequent, malicious and successful, underlining the need to have sufficient protocols in place," the analyst house said.

However, shares in TalkTalk have risen more than four per cent on the London Stock Exchange this morning, suggesting the City welcomes the company's claims that fewer customers were affected by the attack than previously suspected.

Nonetheless, TalkTalk stock remains close to the bottom its 52-week range (220.10p – 415.10p), currently trading at 230p per share.

Next Wednesday (11 November), TalkTalk's boss Dido Harding will report the company's half-year results to the City. Those numbers will only apply up to 30 September this year – apparently before the breach occurred – but TalkTalk will undoubtedly have something to say about the costs it expects to have incurred following the attack on its systems. ®

Broader topics

Other stories you might like

  • CISA and friends raise alarm on critical flaws in industrial equipment, infrastructure
    Nearly 60 holes found affecting 'more than 30,000' machines worldwide

    Updated Fifty-six vulnerabilities – some deemed critical – have been found in industrial operational technology (OT) systems from ten global manufacturers including Honeywell, Ericsson, Motorola, and Siemens, putting more than 30,000 devices worldwide at risk, according to private security researchers. 

    Some of these vulnerabilities received CVSS severity scores as high as 9.8 out of 10. That is particularly bad, considering these devices are used in critical infrastructure across the oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining and building and automation industries. 

    The most serious security flaws include remote code execution (RCE) and firmware vulnerabilities. If exploited, these holes could potentially allow miscreants to shut down electrical and water systems, disrupt the food supply, change the ratio of ingredients to result in toxic mixtures, and … OK, you get the idea.

    Continue reading
  • Inside the RSAC expo: Buzzword bingo and the bear in the room
    We mingle with the vendors so you don't have to

    RSA Conference Your humble vulture never liked conference expos – even before finding myself on the show floor during a global pandemic. Expo halls are a necessary evil that are predominatly visited to find gifts to bring home to the kids. 

    Do organizations really choose security vendors based on a booth? The whole expo hall idea seems like an outdated business model – for the vendors, anyway. Although the same argument could be made for conferences in general.

    For the most part, all of the executives and security researchers set up shop offsite – either in swanky hotels and shared office space (for the big-wigs) or at charming outdoor chess tables in Yerba Buena Gardens. Many of them said they avoided the expo altogether.

    Continue reading
  • 1Password's Insights tool to help admins monitor users' security practices
    Find the clown who chose 'password' as a password and make things right

    1Password, the Toronto-based maker of the identically named password manager, is adding a security analysis and advice tool called Insights from 1Password to its business-oriented product.

    Available to 1Password Business customers, Insights takes the form of a menu addition to the right-hand column of the application window. Clicking on the "Insights" option presents a dashboard for checking on data breaches, password health, and team usage of 1Password throughout an organization.

    "We designed Insights from 1Password to give IT and security admins broader visibility into potential security risks so businesses improve their understanding of the threats posed by employee behavior, and have clear steps to mitigate those issues," said Jeff Shiner, CEO of 1Password, in a statement.

    Continue reading

Biting the hand that feeds IT © 1998–2022