<img src="https://secure.leadforensics.com/32105.png" style="display:none;">

Three Mobile Hacked: Insider Threat Puts Details of 6 Million Customers at Risk

Three-Mobile-Hacked.jpg

Three Mobile have admitted suffering a data breach, a breach that could put at risk the personal details of up to 6 million customers. The hackers successfully gained access to the Three Customer Upgrade Database by using an employee login. Three have admitted that details from 130,000 of their customers is known to have been stolen.

Data stolen in the hack includes names, addresses, and dates of birth. The purpose of the hack was to steal phones, by triggering an upgrade within Three’s systems and intercepting the mobile handset in transit. Three have admitted the hackers successfully managed to order and steal eight phones using the stolen customer details.

Weak password practices by employees are responsible for 65% of data breaches, so it’s no surprise that once again the attack vector is unauthorised credential-based access. Three have not yet disclosed just how the internal login details were obtained, whether by social engineering, insecure storage of passwords or whether it was simply a weak password that was easy for a hacker to work out.

In an attempt to placate Three customers, CEO David Dyson, issued the following statement:

As you may already know, we recently became aware of suspicious activity on the system we use to upgrade existing customers to new devices and I wanted to update all our customers on what happened and what we have done. I understand that our customers will be concerned about this issue and I would like to apologise for this and any inconvenience this has caused. Once we became aware of the suspicious activity, we took immediate steps to block it and add additional layers of security to the system while we investigated the issue.

On 17th November we were able to confirm that 8 customers had been unlawfully upgraded to a new device by fraudsters who intended to intercept and sell on those devices. I can now confirm that the people carrying out this activity were also able to obtain some customer information. In total, information from 133,827 customer accounts was obtained but no bank details, passwords, pin numbers, payment information or credit/debit card information are stored on the upgrade system in question.  

We believe the primary purpose of this was not to steal customer information but was criminal activity to acquire new handsets fraudulently.  We are contacting all of these customers today to individually confirm what information has been accessed and directly answer any questions they have.  As an additional precaution we have put in place increased security for all these customer accounts. We have been working closely with law enforcement agencies on this matter and three arrests have been made. I understand that this will have caused some concern and inconvenience for our customers and for that I sincerely apologise. [David Dyson, CEO]

Stolen Data

Three have carried out an initial investigation, in which they found that for 107,102 customers, the following information could have been obtained: Whether they are a handset or SIM only customer, contract start and end date, handset type, Three account number, how long they’ve been with Three, whether the bill is paid by cash or card, billing date and name. For a further 26,725 customers the following information could have been obtained: Name, address, date of birth, gender, handset type, contract start and end date, whether they are a handset or SIM only customer, telephone number, email address, previous address, marital status, employment status, Three account number and phone number and how long they’ve been with Three.  

Three Customers Beware of Phishing

We expect Three customers to now be targeted by phishing scams where other cyber criminals play on the fear amongst Three users of having had their account details stolen. Three customers should be wary of emails purporting to come from Three asking them to verify or reset account credentials. These will most-likely be phishing emails that link to spoofed websites where customers' login details are captured and stolen.

The Fallout

Should the ICO decide that Three have been negligent, the variety of imposed sanctions could vary from forcing an external audit of the firm to criminal prosecution. The cost to the organisation won’t be limited to remedying the damage or implementing a solution, reputational and financial damage can be significant.

The recent TalkTalk data breach is believed to have cost the organisation £40m, and resulted in 100,000 customers being lost immediately following the data breach. When employees have to manage multiple passwords, security is often the first compromise.

2 out of every 3 attacks focus on credentials, with 63% of confirmed breaches involve taking advantage of weak, default or stolen passwords. It’s no surprise that credentials were responsible for this latest breach at Three Mobile, what is surprising is that they left themselves vulnerable to a credential-based attack through Insider Threat.

Video: Check out how a 2,000-Employee Business Eliminated Insider Threat by Using My1Login.

Back to Blog

Related Articles

Why Zero Knowledge Encryption is a critical consideration for an Identity Management Solution

Identity and Access Management (IAM) and Identity as a Service (IDaaS) vendors typically store some of the most sensitive corporate data on behalf of their...

Five mistakes businesses make which cause data breaches

The frequency and severity of data breaches are continuing to grow, with the cost of the average breach rising again in 2021 to over £3 million. The previous year,...

Ransomware Attacks. Why IAM is a key defence for Enterprises

The rapid growth of ransomware attacks is showing little sign of abating, with 37% of organisations hit by a ransomware attack in 2021, according to Sophos. The...