Tuesday, July 16, 2024
EHA

Virgin Media Hacked – Hackers Breached the Database and Accessed 900,000 People Personal Data

British Telephone company Virgin Media marketing database reportedly hacked by unknown cybercriminals and accessed the customers’ sensitive information.

Virgin Media is a British company that provides telephone, television and internet services with 14.6 million broadband customers in the United Kingdom and the company operating with 14,000 employees.

The database was compromised due to incorrect configuration and it contains 900,000 customers’ personal data such as contact information such as names, home, and email addresses and phone numbers, technical and product information, including any requests you may have made to us using forms on our website.

The hacked database doesn’t contain any passwords or financial details, such as credit card information or bank account numbers.

Lutz Schüler, CEO of Virgin Media said “We recently became aware that one of our marketing databases was incorrectly configured which allowed unauthorized access. We immediately solved the issue by shutting down access to this database, which contained some contact details of approximately 900,000 people, including fixed-line customers representing approximately 15% of that customer base”

Experts are unclear about how many times the database was accessed and the issue was solved by shutting down access to the unsecured database.

Virgin Media said it would be emailing those affected on Thursday, in order to warn them about the risks of phishing, nuisance calls and identity theft. The message will include a reminder not to click on unknown links in emails and not to provide personal details to unverified callers.

we immediately shut down access to the database and launched a full independent forensic investigation. We have also informed the Information Commissioner’s Office. Virgin Media said.

Follow us on TwitterLinkedinFacebook for Daily cyber security & hacking news updates.

Website

Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles