A recent cyberattack on TPG Telecom has reignited concerns about how safe personal information really is in the hands of major companies. What the provider initially downplayed as a “limited” incident has in fact left hundreds of thousands of customers vulnerable to online scams.
The intrusion was uncovered on August 16, when unusual activity was detected in the systems of iiNet, one of TPG’s subsidiary brands. Hackers were able to get inside by misusing stolen employee logins, which granted access to iiNet’s order management platform. This internal tool is mainly used to handle service requests, but it contained far more sensitive data than many would expect.
Investigators now estimate that the attackers walked away with:
• Roughly 280,000 email addresses linked to iiNet accounts
• Close to 20,000 landline phone numbers
• Around 10,000 customer names, addresses, and contact details
• About 1,700 modem setup credentials
Although no banking details or government ID documents were exposed, cybersecurity experts caution that this type of information is highly valuable for criminals. Email addresses and phone numbers can be exploited to craft convincing phishing campaigns, while stolen modem passwords could give attackers the chance to install malware or hijack internet connections.
TPG has apologised for the breach and is reaching out directly to customers whose details were involved. Those not affected are also being notified for reassurance. So far, there have been no confirmed reports of the stolen records being used maliciously.
Even so, the risks are far from minor. Phishing messages that appear to come from trusted sources can lead victims to unknowingly share bank credentials, install harmful software, or hand over personal details that enable identity theft. As a result, affected customers are being urged to remain alert, treat incoming emails with suspicion, and update passwords wherever possible, especially on home modems.
The company has said it is cooperating with regulators and tightening its security protocols. But the case underlines a growing reality: personal data does not need to include credit card numbers to become a target. Seemingly routine details, when collected in bulk, can still provide criminals with the tools they need to run scams.
As cyberattacks grow more frequent, customers are left with the burden of vigilance, while companies face rising pressure to prove that “limited” breaches do not translate into large-scale risks.
A major Chinese telecom company has launched what it claims is the first commercial security system that can protect digital communication from even the most powerful future hackers — including those using quantum computers.
China Telecom Quantum, a state-owned firm, recently introduced a new kind of encryption system that combines two advanced technologies to create strong protection for data, phone calls, and user identity. This system was successfully used to make a secure phone call between Beijing and Hefei a distance of more than 1,000 kilometers — without risking any data leaks or breaches.
The Problem: Quantum Computers Could Break Today’s Encryption
As quantum computing continues to develop, it is expected to pose a serious threat to current cybersecurity systems. These new types of computers are extremely fast and powerful, and experts believe they could one day crack the encryption used to protect sensitive information like passwords, bank data, and government records.
To stay ahead of these threats, China Telecom has built a new system that combines:
1. A quantum-based method that sends encryption keys using the principles of quantum physics, making them nearly impossible to steal or intercept.
2. A mathematics-based method that protects data using very difficult equations that even quantum computers would find hard to solve.
This two-layer approach forms a highly secure framework to protect digital communication.
Tested in Real Conditions and Ready to Use
China Telecom says the system has been tested successfully and is ready to be used on a large scale. The company has already created secure quantum networks in 16 cities, including Beijing, Shanghai, Guangzhou, and Hefei.
These networks now make up a nationwide secure communication system. Among them, Hefei’s network is the largest and most advanced in the world, with eight main hubs and over 150 connection points spread across 1,147 kilometers. It is already being used by around 500 government departments and nearly 400 publicly owned companies.
Extra Tools for Safe Messaging and Document Management
The company has also introduced two new secure tools:
• Quantum Secret — a messaging and teamwork app designed to keep communication safe from even advanced hackers.
• Quantum Cloud Seal — a platform made for secure digital approvals, auditing, and managing documents for businesses and government offices.
Both tools are already being used across different industries in China.
With this launch, China has taken a major step toward building a future-ready cybersecurity system — one that can stay strong even as quantum computing technology continues to grow.
Users in Russia faced an internet outage in a targeted DDoS attack on Russian telecom company Beeline. This is the second major attack on the Moscow-based company in recent weeks; the provider has over 44 million subscribers.
After several user complaints and reports from outage-tracking services, Beeline confirmed the attack to local media.
According to Record Media, internet monitoring service Downdetector’s data suggests “most Beeline users in Russia faced difficulties accessing the company’s mobile app, while some also reported website outages, notification failures and internet disruptions.”
Beeline informed about the attack on its Telegram channel, stressing that the hacker did not gain unauthorized access to consumer data. Currently, the internet provider is restoring all impacted systems and improving its cybersecurity policies to avoid future attacks. Mobile services are active, but users have cited issues using a few online services and account management features.
The targeted attack on Beeline is part of a wider trend of cyberattacks in Russia; in September 2024, VTB, Russia’s second-largest bank, faced similar issues due to an attack on its infrastructure.
These attacks highlight the rising threats posed by cyberattacks cherry-picking critical infrastructures in Russia and worldwide.
Experts have been warning about the rise in intensity and advanced techniques of such cyberattacks, damaging not only critical businesses but also essential industries that support millions of Russian citizens.
How Beeline responds to the attack and recovers will be closely observed by both the telecom industry and regulators. The Beeline incident is similar to the attack on Russian telecom giant Megafon, another large-scale DDoS attack happened earlier this year.
According to a cybersecurity source reported by Forbes Russia, the Beeline attack in February and the Megafon incident in January are the top hacktivist cyberattacks aiming at telecom sectors in 2025.
According to the conversation with Forbes, the source said, “Both attacks were multi-vector and large-scale. The volume of malicious traffic was identical, but MegaFon faced an attack from 3,300 IP addresses, while Beeline was targeted via 1,600, resulting in a higher load per IP address.”
A major cybersecurity breach has been reported against the U.S. Treasury Department, specifically its Office of Foreign Assets Control (OFAC). OFAC, which oversees trade and economic sanctions, was accessed by Chinese state-backed hackers in what officials have described as a "major incident."
How the Attack Happened
The breach was through a vulnerability in BeyondTrust, a remote support software used by the Treasury. Hackers exploited this platform to gain unauthorized access to sensitive government systems. OFAC was their primary focus, likely because of its role in managing sanctions against foreign entities, including Chinese individuals and organizations.
OFAC was originally created in 1950 in the Korean War to block assets from China and North Korea. Today, it remains a very central part of U.S. sanctions enforcement. This makes OFAC a high-value target for espionage.
Impact of the Breach
According to the reports, in addition to OFAC, the hackers accessed the Treasury's Office of Financial Research. Officials have so far confirmed that the compromised systems have been secured, and the hackers do not have access any longer. The extent of data stolen or misused is yet to be determined.
The same hacking crew, which identified itself as the "Salt Typhoon," also has been identified with earlier incidents of hacking other major U.S. telecom firms, including Verizon and AT&T, whose breaches enabled illicit access to customers' communications-affecting contents such as sent text messages or calls, among others-as well as wiretaps conducted by police.
Salt Typhoon is not limited to the United States, as there have been reports of similar breaches in telecommunications networks of several countries. This has shown weaknesses in crucial communication infrastructure.
In response to these incursions, U.S. officials have called for more stringent cybersecurity measures. CISA has suggested using encrypted messaging apps such as Signal to secure communications. Moreover, lawmakers are thinking of banning China Telecom's remaining operations in the U.S.
Senator Ron Wyden also introduced new legislation to ensure the US telecom system's security. All these steps are taken to avoid such breaches in the future and to prevent the sensitive data pertaining to the government and private institutions, which would have been accessed by the state-funded cyberattacks. This was a highly sophisticated cyber-espionage campaign, thus proving the explicit necessity for security measures.
A recent report has outlined a large-scale cyberattack widely referred to as the Matrix campaign. This attack has put in jeopardy an estimated 35 million internet-connected devices across the globe. "This attack contributes to slowing down internet connections to homes and exposes businesses to data breaches, operational interruptions, and reputational damage among others," said Aqua Security's threat intelligence team.
The Matrix campaign is a threat that has been orchestrated by an actor called Matrix. The attack leverages vulnerabilities and weak security practices in the devices like home routers, surveillance cameras, and enterprise systems. According to experts, this attack signifies an emerging trend of IoT device and enterprise infrastructure targeting in order to build botnets for DDoS attacks.
How the Matrix Attack Works
They take advantage of the openly available hacking tools, poor passwords, and misconfiguration to enter devices. Methods used are brute-force attacks and exploitation of hardcoded default credentials such as "admin:admin" or "root:camera." Once a device is compromised, it joins a botnet—a network of hijacked devices that can be used to carry out large-scale cyber attacks like DDoS, overwhelming targets with traffic.
Matrix is not only targeting the home router but also, for instance, the Telecom equipment and server infrastructure are under attack through common protocols and applications such as Telnet, SSH, and Hadoop. Even software development life cycle servers are vulnerable to attack; it has proven an evolution of cybercrime through the exploitation of corporate vulnerabilities.
A Cybercrime Evolution: Low Skills, Big Impact
The scariest part of the Matrix attack is that it seems to be the handiwork of a lone, somewhat novice hacker known as a "script kiddie." This attacker, with the aid of widely available AI tools and ready-to-use hacking software, has mounted an unprecedented campaign around the globe.
According to Aqua Security, this attack highlights the ease with which low-skilled hackers can now execute sophisticated attacks, underscoring the growing danger of poorly secured devices.
How to Protect Yourself
To safeguard your devices from becoming part of a botnet, it is essential to take the following precautions:
1. Update Firmware: Ensure your router and other devices run the latest software updates.
2. Strengthen Passwords: Replace default credentials with strong, unique passwords.
3. Secure Access: Where possible, use additional security measures such as two-factor authentication.
Having addressed these vulnerabilities, the users can secure their devices from further attacks. The Matrix campaign reminds everyone that in today's networked world, proper cybersecurity is essential.
According to PTI, the official statement said “To date, more than 1 crore fraudulent mobile connections have been disconnected with the help of Sancharsaathi. Further, 2.27 lakh mobile handsets have been blocked for involvement in cybercrime /financial frauds.”
Telecom fraud has been a persistent issue in India, with millions of users receiving unsolicited calls and messages daily. These spam calls are not only a nuisance but also pose significant security risks. Fraudsters often use these calls to deceive individuals into sharing personal information, leading to financial losses and identity theft.
To address this growing challenge, Trai and DoT have taken a proactive approach by identifying and disconnecting mobile connections that are suspected of being used for fraudulent activities. This massive disconnection drive is a testament to the authorities’ commitment to safeguarding consumers and maintaining the integrity of the telecom network.
The joint effort by Trai and DoT involved a meticulous process of identifying suspicious mobile connections. This was achieved through advanced data analytics and collaboration with telecom service providers. The authorities focused on connections that exhibited unusual patterns, such as high volumes of outgoing calls or messages, which are typical indicators of spam and fraud.
In addition to disconnecting over 1 crore mobile connections, the authorities also blocked 2.27 lakh mobile handsets that were found to be involved in cybercrime and financial fraud. This dual approach of targeting both the connections and the devices used for fraudulent activities ensures a comprehensive crackdown on telecom fraud.
“In the last fortnight, over 3.5 lakh such numbers have been disconnected and 50 entities have been blacklisted. In addition, around 3.5 Lakh unused and unverified SMS headers and 12 Lakh content templates are blocked,” another statement read.
One of the primary objectives of this initiative is to enhance consumer protection. By disconnecting fraudulent connections, Trai and DoT aim to reduce the number of spam calls and messages that consumers receive. This not only improves the user experience but also helps in building trust in the telecom sector.
Moreover, blocking mobile handsets involved in cybercrime is a crucial step in preventing further misuse. Fraudsters often use these handsets to carry out their activities, and blocking them disrupts their operations. This measure also sends a strong message to those involved in such activities that the authorities are vigilant and will take stringent actions against them.
In this blog post, we delve into how mobile networks embrace AI and its impact on consumers and network operators.
Apple, a tech giant known for its innovation, recently introduced “Apple Intelligence,” an AI-powered operating system. The goal is to make iPhones more intuitive and efficient by integrating AI capabilities into Siri, the virtual assistant. Users can now perform tasks more quickly, receive personalized recommendations, and interact seamlessly with their devices.
Telecom companies worldwide are leveraging AI to optimize mobile phone networks. Here’s how:
AI-driven network monitoring has revolutionized fault localization. For instance:
Network operators like Vodafone create AI digital twins—virtual replicas of real-world equipment such as masts and antennas. These digital twins continuously monitor network performance, identifying anomalies and suggesting preventive measures. As a result, operators can proactively address issues and maintain optimal service levels.
The proliferation of AI generates massive data. Consequently, investments in 5G Standalone (SA) networks have surged. Here’s why:
Despite 5G advancements, experts predict that AI’s demands will eventually outstrip its capabilities. Anticipating this, researchers are already exploring 6G technology, expected around 2028. 6G aims to provide unprecedented speeds, ultra-low latency, and seamless connectivity, further empowering AI-driven applications.