Tuesday, March 11, 2025
HomeCyber Security NewsTelecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Telecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Published on

SIEM as a Service

Follow Us on Google News

Japanese telecom giant NTT Communications (NTT Com) has confirmed a data breach that compromised the information of nearly 18,000 corporate customers.

The breach, which occurred in February, involved unauthorized access to an internal system used for managing service orders.

Details of the Breach

The breached data includes customer names, contract numbers, phone numbers, email addresses, physical addresses, and information on service usage for 17,891 organizations.

However, NTT Com has not disclosed the exact number of individual employees affected by the breach or identified the specific companies impacted.

This incident highlights concerns regarding the security of sensitive corporate data.

Upon detection, NTT Com promptly restricted access to the compromised device and later disconnected another affected device on February 15.

Despite these efforts, the company has not yet revealed the identities or motivations of the hackers involved.

The breach has not been claimed by any major ransomware groups, leaving the nature of the attack unclear, as per a report by Techcrunch.

Telecommunications companies have become increasingly targeted by cybercriminals and nation-state-backed hackers in recent years.

A notable example is the China-linked “Salt Typhoon” hacking group, which targeted U.S. phone and internet giants to access communications of senior government officials.

Such attacks underscore the vulnerability of telco data, which can be exploited for further cyber threats.

NTT Com’s Position

With over 100,000 corporate customers across 70 countries, NTT Com’s extensive reach makes it a significant player in the global telecom sector.

The company’s response to the breach is focused on enhancing security measures to prevent future incidents. However, the breach serves as a reminder of the ongoing challenges in protecting sensitive customer data in the digital age.

As the investigation into the breach continues, concerns arise about how such data could be used in malicious activities, such as identity theft or phishing attacks.

The lack of clarity on the breach’s severity and scope emphasizes the need for stronger cybersecurity protocols in the telecommunications industry.

The recent cybersecurity incident at NTT Com highlights the importance of robust security measures in protecting corporate customer data.

As the telecommunications sector continues to face threats from cyberattacks, proactive measures are essential to safeguard sensitive information.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Evade Security Measures to Launch SIM Swap Attacks

SIM swapping fraud continues to pose a significant threat to individuals and financial institutions,...

Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques

A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat...

macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel

Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS....

Apache Camel Vulnerability Allows Attackers to Inject Arbitrary Headers

A newly disclosed security vulnerability in Apache Camel, tracked as CVE-2025-27636, has raised alarms across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Evade Security Measures to Launch SIM Swap Attacks

SIM swapping fraud continues to pose a significant threat to individuals and financial institutions,...

Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques

A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat...

macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel

Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS....