HomeSecurity OperationsTelekom Malaysia denies validity of stolen customer data claimed by hacker as...

Telekom Malaysia denies validity of stolen customer data claimed by hacker as outdated and recycled info

Published on

spot_img

Telekom Malaysia (TM) has reported that the millions of customer data allegedly stolen by a hacker were actually outdated and recycled information. According to The Star, the telecommunications company conducted internal investigations into the alleged hack and found that the materials were pre-processed, recycled, and dated.

Despite the findings, TM is taking the situation very seriously and has engaged the relevant authorities and lodged a police report. The company stated, “TM is steadfast in continuously fortifying our cyber defenses and bolstering our resilience against such threats to ensure our customers’ data is secured and safe within our ecosystem.”

Yesterday, a hacker claimed to have TM’s entire customer base data and was willing to sell it back to the telco for a fee, essentially making a ransom claim. This prompted TM to file a police report against the hacker and launch investigations into the matter.

The alleged hack and ransom claim have raised concerns about the security of customer data within TM’s systems. In response, the company has assured the public that they are dedicated to resolving the issue with high urgency and are working to strengthen their cyber defenses.

Cybersecurity experts have weighed in on the situation, emphasizing the importance of robust security measures to protect customer data. “Incidents like these highlight the ongoing threat of cyberattacks and the need for organizations to continually update and strengthen their cybersecurity measures,” said one expert.

The alleged breach serves as a reminder for companies to remain vigilant and proactive in safeguarding sensitive customer information. Data breaches can have serious consequences, including financial loss, reputational damage, and legal implications.

In light of the recent events, TM has urged its customers to remain vigilant and report any suspicious activity related to their personal data. The company has also pledged to keep the public informed about any developments in the investigation and the steps being taken to enhance cybersecurity.

As cybersecurity threats continue to evolve, it is essential for organizations to stay ahead of potential risks and invest in robust security measures. The alleged hack at TM serves as a wake-up call for businesses to prioritize cybersecurity and take proactive steps to protect customer data from malicious actors.

In conclusion, TM’s response to the alleged hack and ransom claim underscores the importance of proactive cybersecurity measures in safeguarding sensitive customer information. The company’s commitment to strengthening its cyber defenses and collaborating with authorities to address the issue demonstrates a dedicated effort to ensure the security and integrity of customer data. As the investigation unfolds, it will be crucial for TM to communicate transparently with the public and take any necessary steps to prevent future security breaches.

Source link

Latest articles

WhatsApp Alerts Users About iOS Spyware Threats

WhatsApp Acts Against Malicious Spyware Targeting Users in Italy In a significant move, WhatsApp has...

CISA Adds TrueConf Security Flaw to KEV Catalog Following Wild Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step by officially...

Cisco IMC Authentication Bypass Allows Administrator Access

Cisco Systems has made headlines following the launch of critical security updates aimed at...

Kimsuky Deploys Malicious LNK Files to Distribute Python Backdoor

Kimsuky Unleashes Multi-Stage Malicious LNK Files to Deploy Python-Based Backdoor In a sophisticated cyber-espionage campaign,...

More like this

WhatsApp Alerts Users About iOS Spyware Threats

WhatsApp Acts Against Malicious Spyware Targeting Users in Italy In a significant move, WhatsApp has...

CISA Adds TrueConf Security Flaw to KEV Catalog Following Wild Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step by officially...

Cisco IMC Authentication Bypass Allows Administrator Access

Cisco Systems has made headlines following the launch of critical security updates aimed at...