The threat actor is leaking the database of Pakistan’s leading telecom service Mobilink’s (now @jazzpk).
The database contains personally-identifiable and subscription information for 44,000,000 Pakistanis, including customer full names, home addresses (city, region, street name), National identification (CNIC) numbers, mobile phone numbers, landline numbers, and dates of subscription.
It seems that the huge trove of data was the result of a data breach that took place in 2017, the oldest entries are dated back as 2013.
Last month, a hacker offered for sale a dump containing 115 Million Pakistani mobile user records for over $2 million worth of bitcoin.
The dump was discovered by a Dubai-based cybersecurity firm Rewterz (@rewterz) that confirmed its authenticity and the Pakistan Telecommunication Authority (PTA) is investigating the matter.
Experts at ZDNet have obtained a copy of the dump containing 44 Million records determined that it is part of 115 Million data dump.
The dump also includes information for Pakistani companies.
At the time it is not possible to determine if the dump has been stolen from Jazz servers, it is possible that hackers breached the systems of one of its business partners or a government organization.
Please vote Security Affairs for European Cybersecurity Blogger Awards – VOTE FOR YOUR WINNERS
https://docs.google.com/forms/d/e/1FAIpQLSe8AkYMfAAwJ4JZzYRm8GfsJCDON8q83C9_wu5u10sNAt_CcA/viewform
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Pakistani mobile users, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…
China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…
The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…
BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…
An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…
Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…
This website uses cookies.