Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Stop writing tests: Automate fully with Generative AI

      August 19, 2025

      Opsera’s Codeglide.ai lets developers easily turn legacy APIs into MCP servers

      August 19, 2025

      Black Duck Security GitHub App, NuGet MCP Server preview, and more – Daily News Digest

      August 19, 2025

      10 Ways Node.js Development Boosts AI & Real-Time Data (2025-2026 Edition)

      August 18, 2025

      This new Coros watch has 3 weeks of battery life and tracks way more – even fly fishing

      August 20, 2025

      5 ways automation can speed up your daily workflow – and implementation is easy

      August 20, 2025

      This new C-suite role is more important than ever in the AI era – here’s why

      August 20, 2025

      iPhone users may finally be able to send encrypted texts to Android friends with iOS 26

      August 20, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Creating Dynamic Real-Time Features with Laravel Broadcasting

      August 20, 2025
      Recent

      Creating Dynamic Real-Time Features with Laravel Broadcasting

      August 20, 2025

      Understanding Tailwind CSS Safelist: Keep Your Dynamic Classes Safe!

      August 19, 2025

      Sitecore’s Content SDK: Everything You Need to Know

      August 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Why GNOME Replaced Eye of GNOME with Loupe as the Default Image Viewer

      August 19, 2025
      Recent

      Why GNOME Replaced Eye of GNOME with Loupe as the Default Image Viewer

      August 19, 2025

      Microsoft admits it broke “Reset this PC” in Windows 11 23H2 KB5063875, Windows 10 KB5063709

      August 19, 2025

      How to Fix “EA AntiCheat Has Detected an Incompatible Driver” on Windows 11?

      August 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Stolen Employee Credentials Leads to Data Leak of 280,000 iiNet Customers

    Stolen Employee Credentials Leads to Data Leak of 280,000 iiNet Customers

    August 19, 2025

    iiNet cyber incident, iiNet, TPG Telecom, ASX, Stolen Credentials, Stolen Account Credentials

    TPG Telecom confirms that a cyber incident affecting its iiNet subsidiary exposed the personal data of approximately 280,000 customers, marking one of the most significant breaches reported in Australia this year.

    TPG Telecom, formerly known as Vodafone Hutchison Australia, is the country’s second largest telecom provider and the parent company of iiNet. It has a recorded revenue of AU$5.54B in 2024 and a market cap of AU$9.86B.

    In a filing to the Australian Securities Exchange (ASX) today, TPG said an unknown third party gained unauthorized access to an iiNet order management system on August 16, using “stolen account credentials” from a single employee. The system is used to create and track broadband and related service orders, TPG said.

    iiNet cyber incident, iiNet, TPG Telecom, ASX, Stolen Credentials, Stolen Account Credentials
    TPG Telecom’s filing with the Australian Securities Exchange (Credit: ASX)

    In a separate announcement from iiNet, the company said, the investigation supported by external cybersecurity experts revealed that attackers accessed “limited” personal information. This includes around 280,000 active iiNet email addresses, 20,000 active landline phone numbers, as well as approximately 10,000 usernames, residential addresses and contact numbers. In addition, about 1,700 modem setup passwords were compromised.

    The exposed system did not contain identity documents such as passports or driver’s licenses, nor any credit card or banking data, the telecom giant said.

    iiNet said it moved quickly to disable unauthorized access once the intrusion was identified and has engaged with the Australian Cyber Security Centre (ACSC), the National Office of Cyber Security (NOCS), the Australian Signals Directorate (ASD), and the Office of the Australian Information Commissioner (OAIC) as part of its response.

    iiNet has begun directly contacting affected customers to advise them of next steps, including increased vigilance against phishing emails and phone scams, which are common after breaches of this nature. Customers not impacted by the incident will also be contacted to confirm their data remains secure.

    While the breach appears to have been contained within the iiNet order management system, the scale of the compromise adds further pressure on Australia’s telecommunications sector, which has faced repeated cyber incidents in recent years. Most notably, the 2022 Optus breach exposed the data of 9.8 million customers, sparking regulatory reform and civil penalty action against the carrier.

    Read: Australian Information Commissioner Seeks Civil Penalty Action Over 2022 Optus Data Breach

    TPG Telecom apologized to affected iiNet customers, saying:

    “We unreservedly apologize to our iiNet customers impacted by this incident. We will be taking immediate steps to contact impacted iiNet customers, advise of any actions they should take, and offer our assistance.” (sic)

    For now, TPG maintains there is no evidence the attackers gained access to broader TPG systems or customer bases beyond iiNet. Still, the breach shows the persistent risks around credential theft and highlights the importance of multi-factor authentication and stronger access controls across critical business systems.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePublic Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution
    Next Article U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

    Related Posts

    Development

    Creating Dynamic Real-Time Features with Laravel Broadcasting

    August 20, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    August 20, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-6411 – PHPGurukul Art Gallery Management System SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    3 secrets of PowerToys on Windows 11 that you’ll wish you already knew

    News & Updates

    Cinecred creates film credits without the pain

    Linux

    Chinese-owned VPN apps hide their origin

    Development

    Highlights

    News & Updates

    Xbox has become a Game Pass machine and nothing more — Is it enough to justify Microsoft’s console over a costly gaming PC?

    May 6, 2025

    I can’t think of many reasons to buy an Xbox over competing platforms when Microsoft…

    Long-Term Memory in ChatGPT

    August 13, 2025

    CVE-2025-48793 – Fortinet SSL/TLS Implementation Vulnerability

    May 27, 2025

    CVE-2025-53634 – Chall-Manager Unauthenticated HTTP Gateway Slow Loris Denial of Service

    July 10, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.