Impacted by the breach? Government agencies have published advice on actions to take.
Up to 9.7 million Australians may have had their data obtained through the Optus breach. That’s over 38 per cent of the national population, and nearly half the number of people old enough to have a driver licence.
Josh Allen, a 29-year-old student, is one of the customers impacted by the breach. He joined Optus six years ago to access Premier League coverage; the company holds exclusive broadcast rights until 2028.
“I don’t care about my driver licence,” Allen laughs. “I just need the Premier League.”
Allen believes Optus’ response to the hack was an own goal, he says the company hasn’t been clear on how he’s been personally impacted, and he finds out more information from media outlets than Optus itself.
Optus notified Allen his data was part of the leak on Friday, the 23rd of September — a day after its original media release.
"We apologise unreservedly:" Hear the email Optus sent disclosing the breach to Allen.
This email was all Optus sent Allen directly about the breach for over three weeks, until the company told Allen it was his passport details specifically which had been leaked.
That didn’t stop Optus emailing Allen about unpaid bills. “So they still want their money,” Allen says.
However, Allen also received another email related to the hack, a message from a law firm based in the U.K. invited Allen to provide details to join a class action. He later discovered, the email was fake.
Scams emails, like the one Allen recieved, are a form of ‘social engineering’ — think psychological manipulation — called ‘phishing.’ It’s a strategy used to get targets to willingly hand over their information.
Many phishing techniques rely on impersonating a known source — like a big brand or law firm — to gain targets’ trust. Then, bad actors can direct targets to a fake log-in page or sign-up form.
"It was beautfully done:" Allen recalls getting a phishing attempt after the breach.
Allen believes the phishing email was an attempt to build upon leaked information. In some cases, bad actors can use details they already have like jigsaw pieces to create a complete picture of a target’s identity.
For example, if a bad actor gets a target’s phone number, they can use other information to ‘sim-jack’ the number to their own SIM card by convincing a phone company they’re the target.
In conjunction with a target’s email address, a bad actor may now request and receive 2 Factor Authentication codes from major websites to make logging into the target’s accounts easier.
The jackpot would be the target’s email password, then a bad actor can reset the log in details for the target’s other accounts, including online banking services and social media.
Combine those with ID documents like a passport and credit applications become easy as 1, 2, 3.
"There's part of me that does feel uncertain:" Allen shares concerns about moving forward.
Optus has referred Allen’s passport number to the Documentation Verification Service. Thankfully, that means bad actors can’t use it as an identity check online. Unfortunately, neither can Allen.
In “specific circumstances,” says Optus, the company may foot the bill for a new passport, but there’s still no clarity on how the scheme will work from the Australian Passport Office or Optus.
Had Allen’s driver licence information been leaked, he could apply for a new one from VicRoads. It’s using a form to match application details against leaked data before processing replacements.
And for other information like email accounts or phone numbers, Allen may want to make sure the answers to security questions used to reset the details for those services are known only to him.
In the meantime, Allen is waiting for more communication from Optus. There’s just one problem.
“Do I feel like I can trust them? The short answer is no, really.”
Australian Passport Office, 2022. Optus Data Breach. [online] Australian Government. Available at: <https://www.passports.gov.au/optus-data-breach>
Blakkarly, J, 2022. What to do if you've been caught up in the Optus data breach. [online] Choice. Available at: <https://www.choice.com.au/consumers-and-data/protecting-your-data/data-privacy-and-safety/articles/optus-breach>
Cloudflare, n.d. What is a social engineering attack? [online] Cloudflare. Available at: <https://www.cloudflare.com/en-au/learning/security/threats/social-engineering-attack/>
Kelly, M, 2021. Mozilla Explains: SIM Swapping. [online] Mozilla. Available at: <https://blog.mozilla.org/en/internet-culture/mozilla-explains/mozilla-explains-sim-swapping/>
Office of the Victorian Information Commissioner, 2022. Phishing Attacks and How to Protect Against Them. [online] Victorian Government. Available at: <https://ovic.vic.gov.au/privacy/resources-for-organisations/phishing-attacks-and-how-to-protect-against-them/>
Optus, 2022. Optus notifies customers of cyberattack compromising customer information. [online] Optus. Available at: <https://www.optus.com.au/about/media-centre/media-releases/2022/09/optus-notifies-customers-of-cyberattack>
Optus, 2022. Passport information. [online] Optus. Available at: <https://www.optus.com.au/support/cyberattack/passport-information>
Optus Sport, 2022. Optus Sport is Australia's home of Premier League until 2028 and FA Women’s Super League until 2024. [online] Optus Sport. Available at: <https://sport.optus.com.au/articles/os35270/optus-sport-premier-league-fawsl-australia-rights-deals-details>
Rubenking, N, 2022. SMS-Based Multi-Factor Authentication: What Could Go Wrong? Plenty. [online] PC Magazine. Available at: <https://au.pcmag.com/security/95597/sms-based-multi-factor-authentication-what-could-go-wrong-plenty>
VicRoads, 2022. Information regarding Optus breach. [online]. Victorian Government. Available at: <https://www.vicroads.vic.gov.au/newsmedia/2022/optus-cyberattack>
Those impacted by the incident are advised to contact reputable sources for information.
Reputable sources include:
Office of the Australian Information Commissioner
Moneysmart
IDCare
Australian Cyber Security Centre
You should not use non-government sites to check if your data has been exposed.