Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Australia’s TPG Telecom Investigating iiNet Hack

Posted on August 19, 2025August 19, 2025 By CWS

TPG Telecom, considered one of Australia’s largest cell voice and information options suppliers, is investigating a cybersecurity incident impacting its iiNet model.

The corporate revealed on Tuesday that it had detected unauthorized entry to a administration system designed for creating and monitoring orders for iiNet companies, together with broadband. 

The compromised system shops names, e-mail addresses, cellphone numbers, and residential addresses. Extra delicate information reminiscent of fee card info, banking info, or identification doc copies are usually not saved on the hacked system.

“Presently, the unauthorised entry seems to have been contained to the iiNet order administration system,” TPG Telecom mentioned. “Early investigations recommend the unauthorised entry was gained utilizing stolen account credentials from one worker.”

The investigation is ongoing, however the firm has decided that the hackers have exfiltrated e-mail addresses, cellphone numbers and different varieties of information from the compromised system. 

The evaluation carried out so far discovered that roughly 280,000 energetic iiNet e-mail addresses and 20,000 energetic iiNet landline cellphone numbers, in addition to inactive cellphone numbers and e-mail addresses have been stolen. 

The hackers additionally accessed roughly 10,000 iiNet usernames, bodily addresses and cellphone numbers, in addition to 1,700 modem setup passwords. 

“We don’t at present have any proof to recommend an affect to our broader techniques or different clients,” TPG mentioned. Commercial. Scroll to proceed studying.

Associated: 230k People Impacted by Information Breach at Australian Telco Tangerine

Associated: Connex Credit score Union Information Breach Impacts 172,000 Individuals

Associated: Manpower Says Information Breach Stemming From Ransomware Assault Impacts 140,000

Associated: Workday Information Breach Bears Indicators of Widespread Salesforce Hack

Security Week News Tags:Australias, Hack, iiNet, Investigating, Telecom, TPG

Post navigation

Previous Post: Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data
Next Post: Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

Related Posts

The AI Arms Race: Deepfake Generation vs. Detection Security Week News
China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years Security Week News
Cyber Risk Management Firm Safe Raises $70 Million Security Week News
Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report  Security Week News
Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect Security Week News
Google Says AI Agent Thwarted Exploitation of Critical Vulnerability  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News