Press Releases

TSTT issues update on “cybersecurity issue” Claims no customer passwords or credentials in dump

3 Mins read

As a follow-up to our previous statement regarding the cyber security issue and the company’s ongoing investigation, we are providing the following update to address third party statements that have been in the public domain since our last release, some of which are erroneous, mischievous, and damaging.

Background and Context

TSTT reiterates that it is committed to safeguarding the safety and security of customers’ information and takes matters related to cyber security seriously. Cyber threats are a continuous feature of modern digital operating systems and have become increasingly sophisticated and their frequency has increased significantly. Telecommunications infrastructure is no exception to these threats and incursions.

TSTT has continuously invested millions of dollars in resources in its processes and IT infrastructure to protect its systems and the data it produces and stores. On October 09, 2023, cyber attackers attempted to gain unauthorised access to TSTT’s systems. The company took immediate steps to minimise the security vulnerability, successfully isolating its systems and applications. These applications were subsequently quarantined, rebuilt and put back into production as part of clearly defined policies and procedures.

The company also enlisted the support of internationally recognised cyber security experts and partners in investigating the attempted breach and advising on the implementation of appropriate additional security measures and protocols. Some of these recommendations have already been implemented.

Analysing the data

During the past seven days, TSTT has been working with its international cyber security experts and has undertaken a rigorous examination of data published on the dark web after a ransomware group claimed ownership of a cyberattack on the telecommunications company.

Although the published material was easily accessible, the corroboration process was time consuming because it required cross referencing data across multiple extensive databases to verify sources. With the support of our cyber security consultants, the company has determined that the data released contains largely identifying information, and TSTT apologises to those customers whose information was accessed by these cyber terrorists

While the company is still scrutinising the data, the 6GB accessed represents less than 1% of the petabytes of data the company produces and stores. Moreover, it represents information of a small subset of TSTT’s customer base. A single customer could generate hundreds or thousands of records of non-critical, non-sensitive transactions. The majority of TSTT’s customers’ information was not accessed.

It was also determined that some of the data was accessed from a legacy system, which is no longer utilised by TSTT but which contains data that is, in many instances, no longer valid. This data is kept to ensure TSTT is compliant with relevant laws as it relates to retention of customer information.

With this context, the subset of information accessed contains the following parameters…

What is included What is not included
First Name Call records
Last Name Transactional data
Email Address Customer Passwords
Home Address Credit card information
ID Scans (limited amount) Financial information
Some customer account information, (Account #, billing addresses, and some mobile numbers)
Letters of authorisation: this permits someone to conduct transactions with TSTT on someone’s behalf
Payment receipts

TSTT’s investigation has found that no customer passwords or credentials were accessed.

Due to the nature of the data accessed, internal and external security analysts have advised that there is no elevated risk of fraudulent activity for the group of customers impacted. Some of the information can already be easily accessed via the telephone directory’s white pages. However, TSTT reminds all customers to be vigilant and alert to potential scams and fraudulent activity and report them where necessary.

 It is important to note that certain statements currently in the public domain regarding the publication of personal data are inaccurate and invalid. TSTT does not request, require and/or store on its databases any of the following information related to its customers:

  • Credit Card information
  • Customer passwords
  • Approvals for housing
  • Shipping documents

There is therefore little chance of such information being accessed or published because of the cyber incursion. This underscores the importance of verifying the source and validity of any information or data in the public domain.

Data Centre

TSTT also wishes to address false, misleading, and damaging statements regarding its data centre. TSTT’s data centre (TIA 942-B, Rated 3, SOC-2, DCOS Maturity Level 3 and ISO) is the most secure, resilient and reliable data centre in Trinidad and Tobago, the Caribbean and ranked highly in the Latin American region.

TSTT categorically refutes claims that its data centre was breached and therefore any claims of our corporate client data or credentials being accessed as a result of an alleged breach of our data centre is totally inaccurate, ill-informed and mischievous.

We strongly urge responsible parties to exercise utmost caution and responsibility when publishing and disseminating information. Due to the sensitive nature of this, it is imperative to verify and obtain information from credible and expert sources, as inaccurate and misleading reports can misinform and potentially damage public trust and also harm our company.

This is why TSTT is taking meticulous steps to thoroughly verify all information. We also urge members of the public to exercise discernment in the information they consume, ensuring they receive it from credible and reputable sources to make well-informed decisions.

Related posts

Dukharan deepfaked

Dukharan deepfaked

If a post, video, or article claiming to be me is not hosted on my official website or verified channels, it is a fabrication. Period. I do not endorse get-rich-quick...
Read More
Visa contactless transactions grew 30% during TT’s 2026 Carnival 

Visa contactless transactions grew 30% during TT’s 2026 Carnival 

Digital payments have entered a sustained growth phase in Trinidad and Tobago, fundamentally transforming how locals and visitors experience major cultural celebrations.
Read More
Samsung’s S26 leans in hard on AI

Samsung’s S26 leans in hard on AI

Some users including those with data that requires above average security, may not greet these agentic AI advancements with enthusiasm.
Read More
Why verification technologies will shape the next decade

Why verification technologies will shape the next decade

Trust infrastructure enables identity-backed interactions to cryptographically link each payment to a verified legal identity.
Read More
A 2026 manifesto for Carnival

A 2026 manifesto for Carnival

The idea of Carnival, the spark of the individual, rebellious, expressed as boldly inventive creation still catches fire.
Read More
Digital SME onboarding for CIBC customers coming to TT

Digital SME onboarding for CIBC customers coming to TT

The new system is designed to remove traditional barriers to opening a business account, providing entrepreneurs with a faster, simpler, and more transparent onboarding experience.
Read More
A hiss from a rose

A hiss from a rose

There is likely to be a need for sex re-education to deprogram children who see sex as a wrestling match.
Read More
TATT answers questions about its cybersecurity framework for telcoms, broadcasters

TATT answers questions about its cybersecurity framework for telcoms, broadcasters

Meaningful cybersecurity incidents are those that result in loss or degradation of services, whether isolated or widespread, due to compromised network element.
Read More
News is a niche until it’s not

News is a niche until it’s not

The New York Times produced approximately 230 pieces of content per day on average; The Washington Post, more than 500 per day in 2016
Read More
FT’s second Next Gen News report offers deeper insights

FT’s second Next Gen News report offers deeper insights

Successful producers are reversing the journalism process, dismantling the inverted pyramid of news structure
Read More
Dukharan deepfaked Dukharan deepfaked
Visa contactless transactions grew 30% during TT’s 2026 Carnival  Visa contactless transactions grew 30% during...
Samsung’s S26 leans in hard on AI Samsung’s S26 leans in hard on...
Why verification technologies will shape the next decade Why verification technologies will shape the...
A 2026 manifesto for Carnival A 2026 manifesto for Carnival
Digital SME onboarding for CIBC customers coming to TT Digital SME onboarding for CIBC customers...
A hiss from a rose A hiss from a rose
TATT answers questions about its cybersecurity framework for telcoms, broadcasters TATT answers questions about its cybersecurity...
News is a niche until it’s not News is a niche until it’s...
FT’s second Next Gen News report offers deeper insights FT’s second Next Gen News report...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepth+Featured

TATT answers questions about its cybersecurity framework for telcoms, broadcasters

6 Mins read
Meaningful cybersecurity incidents are those that result in loss or degradation of services, whether isolated or widespread, due to compromised network element.
FeaturedOpinion

Strengthening Cloud Defense: The Shared Responsibility Model

4 Mins read
Every business process, whether it’s managed in-house or hosted in the cloud, still needs to have dedicated ownership to keep accountability where it belongs.
BitDepthFeatured

Ransomware report notes fourth quarter 2025 attack surge

4 Mins read
“The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches.”
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Ben
Ben
2 years ago

Stop relying on international partners. Build some capability internally and pay for prevention. It’s cheaper than remediation.

trackback
2 years ago

[…] TechNewsTT article, TSTT issues update on “cybersecurity issue” Claims no customer passwords or credentials in dump […]

×
FeaturedNews Briefs

Parasram warns of possible GDPR fines after assessing TSTT data dump

2
0
Share your perspective in the comments!x
()
x