Data Leak Exposes Credentials of 280,000 IiNet Customers Due to Theft

Published:

spot_img

Cybersecurity Breach at TPG Telecom’s iiNet Exposes Data of 280,000 Customers

TPG Telecom has recently confirmed a significant cybersecurity breach affecting its iiNet subsidiary, resulting in the exposure of personal information belonging to approximately 280,000 customers. This incident stands out as one of the most consequential data breaches reported in Australia this year.

Overview of TPG Telecom and iiNet

TPG Telecom, previously known as Vodafone Hutchison Australia, is the second-largest telecom provider in Australia. With a market capitalization of AUD 9.86 billion and recording revenues of AUD 5.54 billion in 2024, the company holds a crucial position in the telecommunications industry. iiNet operates as a key subsidiary within TPG, providing broadband and related services to a significant customer base.

Details of the Cyber Incident

In an official disclosure to the Australian Securities Exchange (ASX), TPG provided insights into the breach which occurred on August 16. An unspecified third party exploited "stolen account credentials" from an employee to gain unauthorized access to an iiNet order management system. This system plays a vital role in the creation and tracking of broadband service orders, making it a valuable target for unauthorized access.

Nature of the Data Compromised

According to iiNet’s separate announcement, an investigation conducted with the assistance of external cybersecurity experts confirmed that attackers accessed a limited scope of personal details. This includes approximately 280,000 active iiNet email addresses, around 20,000 active landline phone numbers, and about 10,000 usernames, addresses, and contact numbers. Furthermore, about 1,700 modem setup passwords were compromised during this breach. Importantly, the hackers did not access sensitive identity documents, such as passports or driver’s licenses, nor any credit or banking information.

Immediate Response and Mitigation Steps

Upon detection of the intrusion, iiNet acted swiftly to terminate unauthorized access. The company has since engaged with various governmental bodies, including the Australian Cyber Security Centre (ACSC), the National Office of Cyber Security (NOCS), and the Australian Signals Directorate (ASD). These collaborations are part of a comprehensive response strategy to evaluate and mitigate the impact of the breach.

iiNet is proactively reaching out to affected customers to inform them of necessary measures, such as enhanced vigilance against phishing scams and other forms of fraudulent activity that often increase following such incidents. Customers who were not affected are also being contacted to reassure them of the security of their data.

Implications for the Telecommunications Sector

While the breach appears to be confined to iiNet’s order management system, its scale further emphasizes the ongoing challenges facing Australia’s telecommunications sector, which has experienced multiple cyber incidents in recent years. The high-profile breach involving Optus in 2022, which compromised the data of 9.8 million customers, triggered significant regulatory scrutiny and calls for reform within the industry.

TPG Telecom’s Acknowledgment

In light of the incident, TPG Telecom has publicly apologized to all impacted iiNet customers, stating, “We unreservedly apologize to our iiNet customers impacted by this incident. We will be taking immediate steps to contact impacted iiNet customers, advise of any actions they should take, and offer our assistance.”

Despite the breach being limited to iiNet, the incident underscores the ongoing threats posed by credential theft and the critical importance of implementing multi-factor authentication and robust access controls across all essential business systems.


This cybersecurity incident not only affects the individuals whose data has been compromised but also raises broader questions about the resilience of the telecommunications infrastructure in Australia. As breaches become more frequent and sophisticated, the call for enhanced security measures becomes more urgent.

spot_img

Related articles

Recent articles

Layoffs Ignite Dark Web Demand for Tech Talent

Overall, in 2025, resumes outnumber vacancies 55 per cent to 45 per cent, driven by global layoffs and an influx of younger candidates. |...

UAE Announces Significant Tax Rule Changes Effective January 1, 2026

Updates to UAE Tax Procedures Framework The United Arab Emirates has announced notable changes in its tax procedures with the introduction of Federal Decree-Law No....

French Football Federation Reveals Data Breach Following Administrative Software Compromise

Stolen Credentials Lead to Major Data Breach in French Football The French Football Federation (FFF) has recently confirmed a significant cyber breach affecting club memberships...

Legacy Python Bootstrap Scripts Expose Domain Takeover Risks in Several PyPI Packages

Vulnerabilities Found in Python Packages: A Growing Threat Discovery of Legacy Vulnerabilities Recent investigations by cybersecurity experts at ReversingLabs have revealed significant vulnerabilities within older Python...