Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
AAPT has confirmed a breach of systems held at an external service provider that saw some of the telco's "business customer data" compromised.
The telco told iTnews this morning that it was investigating if a potential data breach, after hacking group Anonymous threatened to release 40 GB of data from an Australian internet service provider.
Some 3.5 GB of data is alleged to be from AAPT.
"It was brought to our attention by our service provider, Melbourne IT, at approximately 9.30pm last night that there had been a security incident and unauthorised access to some AAPT business customer data stored on servers at Melbourne IT," the telco said in a statement.
"AAPT immediately instructed Melbourne IT to shut down the servers when we were notified of the incident."
Anonymous had threatened earlier this week to release the data but was reportedly working to minimise potential harm to individual customers.
The compromised data is suspected to be a 40 GB backup of an Adobe Cold Fusion database, accessed through a well-known vulnerability.
AAPT, which primarily serves business customers after selling its residential base to iiNet for $60 million in 2010, said that preliminary investigation indicated two "historic" data files with "limited personal customer information" had been compromised.
"Further, the servers on which the files were stored have not been used or connected to AAPT for at least 12 months," the company said.
iTnews has since confirmed an older version of AAPT's business website ran on Cold Fusion. Newer pages do not appear to be based on the same systems.
It remains unclear whether the compromised data files may have also included information relating to AAPT's residential customer base prior to acquisition by iiNet.
An iiNet spokesperson has been contacted.
Material from the breach has been uploaded to the web, according to online chat logs from the group. However, this could not be independently confirmed by iTnews at the time of publication.
The threatened release of data appears to be in protest against Australia's proposed data retention regime, which would mandate ISPs to collect and hold transmission data from its users for up to two years.
One hacker told SC that the data was stolen "to prove a lack of security at ISPs and telcos to properly protect the information" that would be stored under the Federal Government's data retention draft policies.
"We are undertaking a thorough investigation into the incident with Melbourne IT and the relevant authorities to establish exactly the type and extent of data that has been compromised, how the security incident happene dand what further measures are required to prevent any future incidents," AAPT said.
"AAPT will be contacting any impacted customers as soon as possible."
Anonymous earlier hinted that AAPT was the provider in question on Twitter: "Apparently rumors are spreading much already. Let us point the attention to this link: en.wikipedia.org/wiki/AAPT #OpAustralia" it tweeted.
More to come...
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.