
Optus stored customer records without unique identifiers.

An Application Programming Interface (API) is an interface that allows a solution to communicate with other digital services and products.īut an unsecured API wasn’t the only vulnerability that facilitated this breach. Access to this API was open to anyone who located it on the internet. This particular API was allegedly used for testing purposes and was not protected by a username or password. The Optus data breach is believed to have been made possible by an unsecured Application Programming Interface (API). In this post, we outline a cybersecurity strategy based on the vulnerabilities that led to Optus’ data breach and best cybersecurity practices to help your business defend against cyberattacks similar to the Optus event. This incident should serve as a sobering wake-up call to all Australian businesses, urging them to evaluate the resilience of their current cybersecurity programs to prevent suffering a similar fate to Optus. Morgan Stanley estimates that up to 30% of victims (or 2.9 million) will forsake Optus for a rival telco provider. It will take some time for Optus to recover from its reputational damage following this event. In other words, this single cybersecurity incident has placed almost half of the Australian population at risk of identity theft scams and financial fraud. 9.8 million current and former Optus customers were impacted by the event, with 2.1 million suffering compromises of highly-sensitive government identification information, like driver’s license numbers and passport numbers. Game and want to purchase it, you can support the developers by doing so here.The Optus data breach was the second-largest data breach in Australia. This download is completely free and won't cost you a penny. Then, launch the game through the desktop shortcut.


We recommend using a download manager for faster download speeds.

The remnants of human civilization are threatened by gigantic creatures breeding beneath the earth.
