Odido, a telecommunications provider based in the Netherlands, has acknowledged an information compromise that has impacted millions of its clientele.
On Thursday, the firm declared in an announcement that unknown cybercriminals had infiltrated its client communication platform, clandestinely extracting vast quantities of customer data. A representative for Odido disclosed to national media in the Netherlands that this security incident involves over 6.2 million clients, which constitutes approximately one-third of the nation’s populace.
The pilfered information encompasses client names, telephone numbers, both physical and electronic mail addresses, birthdates, financial account identifiers (IBANs), and specific particulars from clients’ official identification documents, for instance, passport or driving permit numbers and their respective expiration dates.
The organization indicated that previous clients who received services over the last twenty-four months might likewise be compromised.
Odido specified that the information excluded client communication logs, geographical positioning data, invoicing details, or digital copies of official identification documents. This breach has no bearing on corporate clients, the firm confirmed.
The incident impacts clients of both Odido and its affiliate, Ben NL. The two organizations stated that their mobile, web, and broadcast services remained unimpacted by the security incident.
This constitutes the most recent incident in a succession of information pilfering events aimed at major telecom and mobile entities recently, as state actors and cybercriminals driven by profit persistently pursue the extremely sensitive data that communication providers possess regarding their clientele.
In the past week, Singapore’s authorities verified that a cyber-espionage collective linked to China had earlier infiltrated four leading telecom corporations within the nation in connection with an espionage campaign, though it refrained from accessing clients’ private data.
Concurrently, cybercriminals linked to the Chinese-supported malicious actor identified as Salt Typhoon have compromised numerous telecommunications firms globally, encompassing countries like Canada, Norway, the United Kingdom, and the United States. This was part of a persistent intelligence gathering effort intended for surveillance of high-ranking state personnel and foreign envoys.
{content}
Source: {feed_title}
