There Has Been a Data Breach: Now What?
They say that prevention is better than finding a cure, but in the case of the Telecommunication Services of Trinidad and Tobago (TSTT), that is no longer an option.
Six gigabytes of sensitive data are now up for grabs on the dark web (the internet's equivalent of the black market).
From internal administrative credentials to customer names and addresses, you can access it all using The Onion Router (Tor).
RansomEXX has successfully bypassed all the controls that were meant to mitigate TSTT's risk of a cyberattack.
I deliberately italicized the word 'controls' since, based on what Alex Samm said in his post on this topic, passwords were not encrypted, and RansomEXX's modus operandi usually involves gaining access through phishing.
Now, I'm not saying that TSTT did nothing to prevent this, but storing passwords as plain text in a text file does make me raise my eyebrows.
Alex also made a good point regarding how this matter was addressed on social media.
While some individuals may have blocked out the text on ID cards, the pictures of these customers should have also been concealed.
With that being said, here is what to do in the event of a data breach:
Contain the Breach
Assess the Scope and Impact
Be Transparent
Learn and Adapt
Resources
News Article : 1 Million TSTT Customers Records on the Dark Web
Alex Samm : A Month in Review - Ransomware attack in Trinidad
Phishing Simulation : Terranova Security
Comments
Post a Comment