Sunday, March 30, 2025
HomeCyber Security NewsHackers Steal User's Database From European Telecommunications Standards Institute

Hackers Steal User’s Database From European Telecommunications Standards Institute

Published on

SIEM as a Service

Follow Us on Google News

The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a list of portal users.

The incident was disclosed last week by ETSI. It is still unclear if the attack was carried out for financial gain or if the hackers wanted to utilize the user list for espionage.

An independent, non-profit organization with headquarters in Europe is the European Telecommunications Standards Institute. 

The organization is primarily concerned with creating international standards for information and communications technology (ICT) and telecommunications, including GSM, 3G, 4G, 5G, and others.

In the quickly developing world of telecommunications and digital technologies, ETSI is essential for assuring interoperability, compatibility, and efficient communication. More than 900 organizations from 65 different countries are members of ETSI.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

Insights of the Breach

The French National Cybersecurity Agency (ANSSI) assisted the French-based organization in investigating this incident.

The ANSSI and the ETSI IT team worked together to investigate and fix the information systems after a cyberattack was noticed on the ETSI portal, the IT system dedicated to its members’ work.

“The vulnerability on which the attack was based has been fixed.” According to the data breach notification published by the ETSI. 

“ETSI believes the database containing the list of their online users has been exfiltrated. Since the attack and under the guidance of ANSSI experts, ETSI has fixed the vulnerability, undertaken additional security actions, and significantly strengthened its IT security procedures.”

Reports say a representative declined to comment on whether the vulnerability was known or unknown at the time of the attack.

The company has asked all of its online users to change their passwords as a precaution; however, it is unknown if user credentials were included in the stolen information.

Director-general Luis Jorge Romero called the attack a “crisis” in a statement posted on the organization’s website and applauded ANSSI for helping the organization “determine the remedial actions to be taken, and to strengthen the security of our systems.”

“Transparency is at the root of ETSI, in our governance and technical work. We are very grateful for the knowledge and advice of the experts from the French National Cybersecurity Agency (ANSSI), who have helped us to determine the remedial actions to be taken, and to strengthen the security of our systems,” ETSI Director-General said.

Hence, the French data protection authority has been notified of the data breach, and a judicial inquiry — which is essentially the investigative stage of criminal proceedings in France — is currently ongoing, according to ETSI.

Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.

Latest articles

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...