Offers, Promotions And Reviews

The TalkTalk aftermath: Social engineering and empty bank accounts

The TalkTalk Aftermath: Social Engineering And Empty Bank Accounts

TalkTalk customers caught up in the cyberattack are finding themselves the target of sophisticated social engineering campaigns tailored with TalkTalk data to empty their bank accounts, reports suggest. This month, a cyberattack which struck UK telecoms provider TalkTalk has potentially hit up to four million customers1. Details on how the data breach took place are still sketchy, but the firm says that customers’ name, address, date of birth, email address, telephone number, account information, credit card, and bank account data — albeit incomplete details — may have been accessed. TalkTalk does not believe information stolen from its systems would lead to financial harm to its customers. But while the information might not lead to widespread pilfering of bank accounts in a traditional sense, customers are losing out in other ways — through the clever use of social engineering based on the stolen customer information.

The BBC reports2 that a number of people are saying their bank accounts are being cleared out, even though data stolen from TalkTalk — such as bank account numbers and sort codes — could not be used to access these funds alone. Instead, it appears that cybercriminals possessing this data are calling victims, armed with this information, in order to trick them into handing over additional banking details which can be used to pilfer funds.

What’s Hot on ZDNet

Social engineering can be found in many forms and guises. From the man who wears a UV vest and pretends to be a worker in order to access a corporate building to the scammer who calls you pretending your computer “has a virus” and as Microsoft tech support he can clear it — in return for a fee — it only takes a small amount of data for criminals to dupe victims into willingly handing over something more valuable. In TalkTalk’s case, social engineering is an issue — but it’s unlikely everyone will be targeted by this scam, simply due to the time required. However, customers are also reporting3 that hackers are using their passwords, originally found on TalkTalk but used elsewhere, to plunder their bank accounts through online services. TalkTalk has said it will write to customers but will not call individually — but reaching so many customers, as well as making them aware of what social engineering is and the risks associated with it is not a small task.

On Sunday, TalkTalk said cybersecurity defense firm BAE Systems has been hired4 to investigate the cyberattack. The company also admitted it had received a ransom demand from the group behind the hack, and according to security expert Brian Krebs5, the ransom was for 80,000 (?120,000) to stop the data being leaked to the Web. It now appears to be too late to stem the spread. Within the Dark Web, data is being offered for sale from multiple sellers who prove they have the stolen information through samples. (ZDNet has not been able to verify the legitimacy of the data). According to a TalkTalk support notification6, not all data stolen by the cybercriminals was encrypted, and on Sunday, Harding said the company was under “no legal obligation” to encrypt sensitive customer data7.

While these remarks aren’t likely to do the telecoms firm any favors in the wake of the cyberattack, it is worth noting that the UK’s 1998 Data Protection Act only implies that sensitive data should be protected with “appropriate technical and organizational measures,” — but there is no legal bind8 forcing firms to invest in encryption. The telecoms provider has also faced criticism for charging customers hundreds of pounds if they wish to leave the service in the wake of the attack9. According to TalkTalk CEO Dido Harding, waiving standard get-out regulations and fees right now would not work as it is “too early to know who has and hasn’t been affected.”

“But on an individual customer basis, of course we want to do what is right for our customers,” Harding commented. At the time of writing, TalkTalk’s website is down. However, a spokesman said10 once an investigation by TalkTalk and BAE Systems is complete, the website will be up and running again as quickly as possible.

A hacker allegedly representing the hacktivist group LulzSec has claimed responsibility11 for a distributed denial-of-service (DDoS) attack which hit the ISP this week. While the hacker, dubbed AnonZor, says the group was not responsible for the information theft, they launched the DDoS attack to show LulzSec has taken itself out from retirement.

TalkTalk is offering customers one year of free credit monitoring12 — but this token apology is not necessarily enough when faced with a group sophisticated enough to leverage social engineering against customers in order to rinse their bank accounts. Unfortunately, TalkTalk’s cyberattack is now going to filter to the banking system and law enforcement which will need to work with customers duped by the criminals in an attempt to recover their lost funds.

Read on: Top picks

References

  1. ^ to four million customers (www.zdnet.com)
  2. ^ BBC reports (www.bbc.com)
  3. ^ are also reporting (www.thetimes.co.uk)
  4. ^ has been hired (www.reuters.com)
  5. ^ security expert Brian Krebs (krebsonsecurity.com)
  6. ^ TalkTalk support notification (help2.talktalk.co.uk)
  7. ^ encrypt sensitive customer data (www.theregister.co.uk)
  8. ^ legal bind (www.legislation.gov.uk)
  9. ^ in the wake of the attack (www.bbc.com)
  10. ^ a spokesman said (www.theregister.co.uk)
  11. ^ has claimed responsibility (motherboard.vice.com)
  12. ^ free credit monitoring (help2.talktalk.co.uk)

>


ACER LAPTOPS APPLE LAPTOPS ASUS LAPTOPS COMPAQ LAPTOPS DELL LAPTOPS HP LAPTOPS LENOVO LAPTOPS MSI LAPTOPS SAMSUNG LAPTOPS SONY LAPTOPS TOSHIBA LAPTOPS

Leave a Reply

Your email address will not be published. Required fields are marked *

*