Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: Pickup Sticklers

      September 27, 2025

      From Prompt To Partner: Designing Your Custom AI Assistant

      September 27, 2025

      Microsoft unveils reimagined Marketplace for cloud solutions, AI apps, and more

      September 27, 2025

      Design Dialects: Breaking the Rules, Not the System

      September 27, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Cailabs secures €57M to accelerate growth and industrial scale-up

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025
      Recent

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025

      Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

      September 28, 2025

      The first browser with JavaScript landed 30 years ago

      September 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured
      Recent
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Stolen Employee Credentials Leads to Data Leak of 280,000 iiNet Customers

    Stolen Employee Credentials Leads to Data Leak of 280,000 iiNet Customers

    August 19, 2025

    iiNet cyber incident, iiNet, TPG Telecom, ASX, Stolen Credentials, Stolen Account Credentials

    TPG Telecom confirms that a cyber incident affecting its iiNet subsidiary exposed the personal data of approximately 280,000 customers, marking one of the most significant breaches reported in Australia this year.

    TPG Telecom, formerly known as Vodafone Hutchison Australia, is the country’s second largest telecom provider and the parent company of iiNet. It has a recorded revenue of AU$5.54B in 2024 and a market cap of AU$9.86B.

    In a filing to the Australian Securities Exchange (ASX) today, TPG said an unknown third party gained unauthorized access to an iiNet order management system on August 16, using “stolen account credentials” from a single employee. The system is used to create and track broadband and related service orders, TPG said.

    iiNet cyber incident, iiNet, TPG Telecom, ASX, Stolen Credentials, Stolen Account Credentials
    TPG Telecom’s filing with the Australian Securities Exchange (Credit: ASX)

    In a separate announcement from iiNet, the company said, the investigation supported by external cybersecurity experts revealed that attackers accessed “limited” personal information. This includes around 280,000 active iiNet email addresses, 20,000 active landline phone numbers, as well as approximately 10,000 usernames, residential addresses and contact numbers. In addition, about 1,700 modem setup passwords were compromised.

    The exposed system did not contain identity documents such as passports or driver’s licenses, nor any credit card or banking data, the telecom giant said.

    iiNet said it moved quickly to disable unauthorized access once the intrusion was identified and has engaged with the Australian Cyber Security Centre (ACSC), the National Office of Cyber Security (NOCS), the Australian Signals Directorate (ASD), and the Office of the Australian Information Commissioner (OAIC) as part of its response.

    iiNet has begun directly contacting affected customers to advise them of next steps, including increased vigilance against phishing emails and phone scams, which are common after breaches of this nature. Customers not impacted by the incident will also be contacted to confirm their data remains secure.

    While the breach appears to have been contained within the iiNet order management system, the scale of the compromise adds further pressure on Australia’s telecommunications sector, which has faced repeated cyber incidents in recent years. Most notably, the 2022 Optus breach exposed the data of 9.8 million customers, sparking regulatory reform and civil penalty action against the carrier.

    Read: Australian Information Commissioner Seeks Civil Penalty Action Over 2022 Optus Data Breach

    TPG Telecom apologized to affected iiNet customers, saying:

    “We unreservedly apologize to our iiNet customers impacted by this incident. We will be taking immediate steps to contact impacted iiNet customers, advise of any actions they should take, and offer our assistance.” (sic)

    For now, TPG maintains there is no evidence the attackers gained access to broader TPG systems or customer bases beyond iiNet. Still, the breach shows the persistent risks around credential theft and highlights the importance of multi-factor authentication and stronger access controls across critical business systems.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePublic Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution
    Next Article U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

    Related Posts

    Development

    Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

    September 28, 2025
    Development

    Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

    September 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    First known AI-powered ransomware uncovered by ESET Research

    Development

    AI-Powered Personalization: Redefining the Future of Customer Experience✨

    Web Development

    This Bluetooth tracker’s latest feature could save your life – but it costs extra

    News & Updates

    Vibe Coding: Game Changer or Catastrophe For App/Game Dev?

    Web Development

    Highlights

    XOR Marks the Flaw in SAP GUI

    June 25, 2025

    XOR Marks the Flaw in SAP GUI

    Source: Tricky_Shark via ShutterstockSAP has patched a couple of vulnerabilities in its graphical user interface (SAP GUI) input history feature that give attackers a way to potentially access sensiti …
    Read more

    Published Date:
    Jun 25, 2025 (2 hours, 2 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-0059

    CVE-2025-0056

    CVE-2025-0055

    Stability AI Introduces Adversarial Relativistic-Contrastive (ARC) Post-Training and Stable Audio Open Small: A Distillation-Free Breakthrough for Fast, Diverse, and Efficient Text-to-Audio Generation Across Devices

    May 15, 2025

    VS meldt actief misbruik van kwetsbaarheden in Craft CMS

    June 3, 2025

    Reasons Why Your WordPress Website Isn’t Ranking in Google

    July 17, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.