HomeCII/OTShinyHunters Leaks 2 Million Records from Dutch Telecom Odido, Claims 21 Million...

ShinyHunters Leaks 2 Million Records from Dutch Telecom Odido, Claims 21 Million Stolen

Published on

spot_img

Massive Data Breach Affects Odido Customers Amid Threats from Cybercriminals

The recent data breach involving Dutch telecom provider Odido and its budget brand Ben has escalated into a critical situation, following the actions of the criminal group ShinyHunters. After the company refused to comply with ransom demands, ShinyHunters publicly exposed the private customer records, uploading them onto the dark web.

A Growing Data Dump

The incident first came to light over the weekend of February 7th, when hackers initiated a confrontation by demanding an exorbitant ransom exceeding €1 million to maintain the confidentiality of the stolen data. When Odido opted to refuse the ransom request, the group shifted to a “daily leak” strategy as a means of coercion. On Thursday, approximately 1 million lines of sensitive customer information were released online, followed by another million the subsequent morning.

The scale of the breach has been a topic of intense debate. While Odido initially estimated that around 6.2 million current and former customers were affected, ShinyHunters contends that the true number of compromised records could be as high as 21 million. Insider reports from Hackread.com have revealed that the hackers are leveraging these public leaks to pressure Odido into negotiations, issuing urgent calls to pay or risk further digital consequences.

What Was Actually Taken?

The nature of the leaked data extends beyond simple names and numbers, encompassing a wealth of sensitive information. Among the disclosed materials are physical home addresses, email accounts, and bank account details, including International Bank Account Numbers (IBAN). Perhaps most alarming is the potential exposure of personal identification information, such as passport and driving license numbers.

In a statement addressing the concerns surrounding the leak, Odido clarified that plaintext passwords—those stored in an easily readable format—were not included in the compromised data, despite what the hackers have suggested. The company also reassured customers that billing information and scans of identity documents remain secure. Nevertheless, with such a significant volume of personal data now accessible, the specter of identity theft looms larger, prompting urgent calls for caution among affected individuals.

Why Odido Won’t Pay

Odido’s CEO, Søren Abildgaard, has stated unequivocally that the company will not yield to the demands of the cybercriminals, emphasizing a firm stance against negotiating with criminals or succumbing to extortion. This approach enjoys full support from the Dutch national police, who caution against paying ransoms to criminals. Stan Duijf, a representative of the police’s cybercrime unit, reiterated this advice, discouraging ransom payments on the grounds that they may inadvertently fund future cyberattacks and do not guarantee the deletion of stolen data.

In response to the breach, Odido is taking proactive measures to assist those affected by offering a free 24-month digital security package. This initiative aims to provide a crucial safety net for customers who may be at risk of fraudulent activities stemming from the exposure of their personal information. Users who have previously interacted with Odido or Ben are advised to exercise heightened vigilance regarding unsolicited communications and suspicious links that may come their way.

Moving Forward

As the ramifications of this data breach unfold, the incident highlights the ongoing struggles that organizations face in safeguarding consumer data against threats from cybercriminals. Odido’s resolve to resist ransom demands, though risky, underscores a broader principle in the fight against cybercrime: that yielding to threats can perpetuate a cycle of criminal behavior.

In conclusion, as the dust settles on this significant breach, both Odido and its customers are left to navigate the aftermath, emphasizing the need for stronger security protocols and a commitment to greater transparency in the telecommunications sector. As more details continue to emerge, the situation serves as a stark reminder of the vulnerabilities inherent in our increasingly interconnected digital lives.

Source link

Latest articles

New Aeternum C2 Botnet Avoids Takedowns Using Polygon Blockchain

The Evolution of Botnets: Aeternum C2 and Its Blockchain-Based Control Mechanism For years, the method...

Windows 11 Update Enhances BitLocker and Sysmon

Schubert Jonckheer and Kolbe LLP Launches Investigation into QualDerm Partners Data Breach In response to...

Hackers Utilize 1Campaign to Conceal Malicious Ads from Google Reviewers

New Cloaking Platform 1Campaign: A Threatening Tool for Cybercriminals In a recent analysis, cybersecurity researchers...

Google Thwarts Hackers Linked to China – CyberMaterial

Google has recently taken significant measures to dismantle a large-scale surveillance operation associated with...

More like this

New Aeternum C2 Botnet Avoids Takedowns Using Polygon Blockchain

The Evolution of Botnets: Aeternum C2 and Its Blockchain-Based Control Mechanism For years, the method...

Windows 11 Update Enhances BitLocker and Sysmon

Schubert Jonckheer and Kolbe LLP Launches Investigation into QualDerm Partners Data Breach In response to...

Hackers Utilize 1Campaign to Conceal Malicious Ads from Google Reviewers

New Cloaking Platform 1Campaign: A Threatening Tool for Cybercriminals In a recent analysis, cybersecurity researchers...