Saturday, May 4, 2024
Home Cyber Attack Data Breach : 600+ data of NTT Telecom customer are stolen

Data Breach : 600+ data of NTT Telecom customer are stolen

One of the largest telecoms and IT services companies has revealed that the attacker may have stolen the data from the internal system and affected around 600 customers.

The NTT Company which is mainly based on Communication and telecom Services. The company also provides cloud, network, and data center services to the biggest companies in the world.

The parent company.NTT Group Ranked in the top 100 companies in the world.

On Thursday, the company claims that it detected an unauthorized attack on the Active Directory services. 

According to the official statement “When team research about the attack they found the hacker used the diversion to attack the company data breach. The Hackers first hacked the cloud server (Server B ) which is located in the Singapore data center, after that the attackers found the path to attack the internal server (Server A) and that was the admin user database handler server known as Active Directory (AD) Server.

The Attacker did not stop there and they finally compromised the information management server (Server C) that is used for NTT’s cloud and hosting customers.

Server C is the main target for the attacker where they breached and stole data of 621 Customers.

NTT released a press note of the Global threat Intelligence Report  where it was mentioned that the technology sector was the most attacked worldwide in 2019. It also said that the cyber attacker is using multi-function attack tools which are included with artificial intelligence/machine learning capabilities. and use the automation techniques to increase the chance of successful attacks to 21%.

NTT customer data was stolen in May and it was clearly shown the compromise for the server to move inside the company network.

If all the above-claimed statement is right then all Telecomm companies have to worry before the attacker are active on their network. The company needs to find the core security backdoor and minimize the attacks on the user data.

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

3 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments