Sunday, May 25, 2025
HomeCyber Security NewsTelecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Telecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Published on

SIEM as a Service

Follow Us on Google News

Japanese telecom giant NTT Communications (NTT Com) has confirmed a data breach that compromised the information of nearly 18,000 corporate customers.

The breach, which occurred in February, involved unauthorized access to an internal system used for managing service orders.

Details of the Breach

The breached data includes customer names, contract numbers, phone numbers, email addresses, physical addresses, and information on service usage for 17,891 organizations.

- Advertisement - Google News

However, NTT Com has not disclosed the exact number of individual employees affected by the breach or identified the specific companies impacted.

This incident highlights concerns regarding the security of sensitive corporate data.

Upon detection, NTT Com promptly restricted access to the compromised device and later disconnected another affected device on February 15.

Despite these efforts, the company has not yet revealed the identities or motivations of the hackers involved.

The breach has not been claimed by any major ransomware groups, leaving the nature of the attack unclear, as per a report by Techcrunch.

Telecommunications companies have become increasingly targeted by cybercriminals and nation-state-backed hackers in recent years.

A notable example is the China-linked “Salt Typhoon” hacking group, which targeted U.S. phone and internet giants to access communications of senior government officials.

Such attacks underscore the vulnerability of telco data, which can be exploited for further cyber threats.

NTT Com’s Position

With over 100,000 corporate customers across 70 countries, NTT Com’s extensive reach makes it a significant player in the global telecom sector.

The company’s response to the breach is focused on enhancing security measures to prevent future incidents. However, the breach serves as a reminder of the ongoing challenges in protecting sensitive customer data in the digital age.

As the investigation into the breach continues, concerns arise about how such data could be used in malicious activities, such as identity theft or phishing attacks.

The lack of clarity on the breach’s severity and scope emphasizes the need for stronger cybersecurity protocols in the telecommunications industry.

The recent cybersecurity incident at NTT Com highlights the importance of robust security measures in protecting corporate customer data.

As the telecommunications sector continues to face threats from cyberattacks, proactive measures are essential to safeguard sensitive information.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...