Moderator: 3ne2nr Mods
Yes.paid_influencer wrote:what could people really do with a copy of my id card and dp tho
could they get an island finance loan
ready finance?>
pugboy wrote:so is the data the hacker put out available as files to download ?
or did they just put out screenshots ?
paid_influencer wrote:well they say 1 million records. could be database records. might not necessarily be 1 million different peoples, depending on the query
massy had a big breach that was p bad.
tomorrow i going massy and they will ask me if i have a massy card. i will again say no. my shopping habits are my secret
TSTT is being urged to not downplay the cyberattack and breach of its system, as the ransomware group who are “criminal extortionists” will hit them again to send a message.
“The ransomware gangs are like cartels, they are criminal extortionists... These people are not little hackers, we are talking about some of the best talent in the world, there are huge companies that are getting hacked,” he said, adding that companies have to be very careful about how they respond.
He is of the view that TSTT has sought to downplay the breach and this is something the ransomware gang is looking closely at.
“It’s kind of like poking the bear... actually they are like gigantic dragons, because you are telling everybody you have things under control, so they will wait for TSTT to do damage control, and there is a high possibility that they can come back and hit them with something even worse,” he said.
https://trinidadexpress.com/news/local/ransomware-group-can-come-back/article_50c642a6-7ab3-11ee-b14a-dfc3b3c5b560.html
•Internal administrative credentials (usernames and passwords) used by TSTT staff for access systems and servers managed by TSTT. In case you were wondering, administrative credentials can basically allow a person to do anything on the systems.
•Credentials used by TSTT administrators for file systems.
•Customer Personal Identifiable Information (PII) such as Full Names, Addresses, Telephone numbers, email addresses and even company names.
•Source code for applications used by TSTT which included usernames and passwords coded directly into it.
•Daily reports showing summary of calls to locations and related carrier information.
•Dumps of databases that show the passwords used for cashier accounts.
•Scanned documents that include the IDs for customers, payment receipts and customer invoices with amounts, dates, and other details.
"Professional Penetration Tester" yuh saying inno...The_Honourable wrote:Here is the full technical analysis by Cybersecurity Heavyweight and Professional Penetration Tester, Alex Samm on the TSTT data dump:
https://www.linkedin.com/pulse/month-re ... amm-k9ive/
No tech company gets rid of data.. They simply ask if u want ur data moved from the 'active' file to the 'trash' filedeath365 wrote:So nobody eh post the tor link yet ?
I was ah bmobile crustomer back in d days pre-digicel and wanted to see if I'm still there
ed360123 wrote:This is madness. And nobody at TSTT going to lose their jobs over it.
Update (November 04): I’ve had some requests from friends who want to find out what’s in the TSTT data dumped to the darkweb by RansomEXX. There are several files, the most notable of which are an ID file, listing customer identification information with 377,164 records, a contacts file with 800,977 records, a file with employee IDs and passwords with 158,032 records and an Oracle database Customers file with 4,293,368 records.
File sizes are slightly deceptive, since some customers are listed multiple times with different information associated with them or duplicate information, but the overall count is massive.
It’s important to note that while a spreadsheet is a database, a sophisticated database is not a spreadsheet. As a consequence, the way some of these files open in a spreadsheet is not the way it will be read into a database file.
The customers file, for example, quickly hits the upper limit of a spreadsheet’s capabilities. Apple’s Numbers stalls out at one million records while Excel coughs up a lung at just shy of 1.5 million. Neither app could open the full customer database.
In addition, columns in the file aren’t read properly and are conflated into near unreadability. It’s possible to tease the information – which lists internal customer ranking and status information – out of the file, but without loading it into a compatible database, the file is unusable to the casual browser.
A moderately talented spreadsheet/database jockey should be able to knit this information together to amass a surprisingly detailed profile of the customers in this data.
TSTT has characterised this information as being equivalent to the information to be found in a phone directory. That is absurd, A phone directory is not malleable information that can be matched with other datasets. It also does not contain bank account information or personal ID information.
Return to “Ole talk and more Ole talk”
Users browsing this forum: No registered users and 12 guests