Bharat Sanchar Nigam Limited (BSNL), India’s state-owned telecommunications provider, has suffered a major data breach orchestrated by a threat actor known as “kiberphant0m”.
The cyberattack has compromised over 278GB of sensitive data, putting millions of users at risk of SIM card cloning, identity theft, and financial fraud.
According to a report by digital risk management firm Athentian Tech, the compromised data includes international mobile subscriber identity (IMSI) numbers, SIM card details, home location register (HLR) data, and critical security keys.
Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot
This extensive operational data could enable sophisticated attacks targeting not only BSNL but also interconnected systems and networks, posing significant national security risks.
Kanishk Gaur, CEO of Athentian Tech, told The Economic Times that the compromised data is being sold on the dark web for $5,000. Gaur emphasized the complexity and critical nature of the breached data, which goes beyond typical user information and targets the core of BSNL’s operational systems.
This high price tag underscores the data’s value due to its sensitive nature and broad scope, surpassing typical user information and targeting BSNL’s core operations.
This incident marks the second data breach BSNL has experienced in the past six months. In December 2023, a threat actor known as “Perell” released a dataset containing 32,000 lines of sensitive information about BSNL’s fibre and landline users.
Potential risks include:
Experts urge BSNL to promptly investigate and contain the breach, secure network endpoints, audit access logs, and implement enhanced security measures.
Users are advised to monitor accounts for unusual activity, enable two-factor authentication, and remain vigilant against phishing and social engineering attacks.
This incident marks the second data breach for BSNL within six months, raising serious concerns about the company’s data security practices and the potential consequences for its users and national security.
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…
A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…
Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…
The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…
A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…
Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…