Press Releases

TSTT issues update on “cybersecurity issue” Claims no customer passwords or credentials in dump

3 Mins read

As a follow-up to our previous statement regarding the cyber security issue and the company’s ongoing investigation, we are providing the following update to address third party statements that have been in the public domain since our last release, some of which are erroneous, mischievous, and damaging.

Background and Context

TSTT reiterates that it is committed to safeguarding the safety and security of customers’ information and takes matters related to cyber security seriously. Cyber threats are a continuous feature of modern digital operating systems and have become increasingly sophisticated and their frequency has increased significantly. Telecommunications infrastructure is no exception to these threats and incursions.

TSTT has continuously invested millions of dollars in resources in its processes and IT infrastructure to protect its systems and the data it produces and stores. On October 09, 2023, cyber attackers attempted to gain unauthorised access to TSTT’s systems. The company took immediate steps to minimise the security vulnerability, successfully isolating its systems and applications. These applications were subsequently quarantined, rebuilt and put back into production as part of clearly defined policies and procedures.

The company also enlisted the support of internationally recognised cyber security experts and partners in investigating the attempted breach and advising on the implementation of appropriate additional security measures and protocols. Some of these recommendations have already been implemented.

Analysing the data

During the past seven days, TSTT has been working with its international cyber security experts and has undertaken a rigorous examination of data published on the dark web after a ransomware group claimed ownership of a cyberattack on the telecommunications company.

Although the published material was easily accessible, the corroboration process was time consuming because it required cross referencing data across multiple extensive databases to verify sources. With the support of our cyber security consultants, the company has determined that the data released contains largely identifying information, and TSTT apologises to those customers whose information was accessed by these cyber terrorists

While the company is still scrutinising the data, the 6GB accessed represents less than 1% of the petabytes of data the company produces and stores. Moreover, it represents information of a small subset of TSTT’s customer base. A single customer could generate hundreds or thousands of records of non-critical, non-sensitive transactions. The majority of TSTT’s customers’ information was not accessed.

It was also determined that some of the data was accessed from a legacy system, which is no longer utilised by TSTT but which contains data that is, in many instances, no longer valid. This data is kept to ensure TSTT is compliant with relevant laws as it relates to retention of customer information.

With this context, the subset of information accessed contains the following parameters…

What is included What is not included
First Name Call records
Last Name Transactional data
Email Address Customer Passwords
Home Address Credit card information
ID Scans (limited amount) Financial information
Some customer account information, (Account #, billing addresses, and some mobile numbers)
Letters of authorisation: this permits someone to conduct transactions with TSTT on someone’s behalf
Payment receipts

TSTT’s investigation has found that no customer passwords or credentials were accessed.

Due to the nature of the data accessed, internal and external security analysts have advised that there is no elevated risk of fraudulent activity for the group of customers impacted. Some of the information can already be easily accessed via the telephone directory’s white pages. However, TSTT reminds all customers to be vigilant and alert to potential scams and fraudulent activity and report them where necessary.

 It is important to note that certain statements currently in the public domain regarding the publication of personal data are inaccurate and invalid. TSTT does not request, require and/or store on its databases any of the following information related to its customers:

  • Credit Card information
  • Customer passwords
  • Approvals for housing
  • Shipping documents

There is therefore little chance of such information being accessed or published because of the cyber incursion. This underscores the importance of verifying the source and validity of any information or data in the public domain.

Data Centre

TSTT also wishes to address false, misleading, and damaging statements regarding its data centre. TSTT’s data centre (TIA 942-B, Rated 3, SOC-2, DCOS Maturity Level 3 and ISO) is the most secure, resilient and reliable data centre in Trinidad and Tobago, the Caribbean and ranked highly in the Latin American region.

TSTT categorically refutes claims that its data centre was breached and therefore any claims of our corporate client data or credentials being accessed as a result of an alleged breach of our data centre is totally inaccurate, ill-informed and mischievous.

We strongly urge responsible parties to exercise utmost caution and responsibility when publishing and disseminating information. Due to the sensitive nature of this, it is imperative to verify and obtain information from credible and expert sources, as inaccurate and misleading reports can misinform and potentially damage public trust and also harm our company.

This is why TSTT is taking meticulous steps to thoroughly verify all information. We also urge members of the public to exercise discernment in the information they consume, ensuring they receive it from credible and reputable sources to make well-informed decisions.

Related posts

ISC2 anti-scammer guidance

ISC2 anti-scammer guidance

The Caribbean Chapter of the ISC2 has issued guidance and advice for internet users facing phishing messages and WhatsApp scams.
Read More
Gifts for the tech obsessed

Gifts for the tech obsessed

If you travel regularly, replacing multiple chargers with one unit that can do double or triple duty makes sense, even more so if it has a foldable wall plug.
Read More
TATT begins digital television free to air testing

TATT begins digital television free to air testing

The transition of free-to-air television from analogue to digital will bring an enhanced quality of service to consumers, including up to 4K high-definition resolution video, access to electronic programming guides,...
Read More
New CELIA submarine cable to connect Caribbean to the US

New CELIA submarine cable to connect Caribbean to the US

CELIA will enhance connectivity in the Caribbean region, providing high-capacity and secure data transfer and very high Internet speeds with low latency.
Read More
Samsung leans in on extended reality (XR)

Samsung leans in on extended reality (XR)

Supported by the broader Galaxy ecosystem, this technology will empower and transform your everyday life in a way that only we can deliver.
Read More
What keeps regional cybersecurity experts awake at night

What keeps regional cybersecurity experts awake at night

Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.
Read More
Where hackers begin

Where hackers begin

Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Read More
Blue skies for microblogging?

Blue skies for microblogging?

Bluesky hit its current high of 23 million users faster than expected, but it’s way behind X.
Read More
Samsung Electronics Joins the Carbon Trust

Samsung Electronics Joins the Carbon Trust

Globally, connected devices currently require approximately 500 terawatt-hours (TWh) of energy annually.
Read More
The apps that thrive in Apple’s ecosystem

The apps that thrive in Apple’s ecosystem

By Apple's own yardstick an app that shares usable data across three devices is acceptable one that synchronises with four is a winner.
Read More
ISC2 anti-scammer guidance ISC2 anti-scammer guidance
Gifts for the tech obsessed Gifts for the tech obsessed
TATT begins digital television free to air testing TATT begins digital television free to...
New CELIA submarine cable to connect Caribbean to the US New CELIA submarine cable to connect...
Samsung leans in on extended reality (XR) Samsung leans in on extended reality...
What keeps regional cybersecurity experts awake at night What keeps regional cybersecurity experts awake...
Where hackers begin Where hackers begin
Blue skies for microblogging? Blue skies for microblogging?
Samsung Electronics Joins the Carbon Trust Samsung Electronics Joins the Carbon Trust
The apps that thrive in Apple’s ecosystem The apps that thrive in Apple’s...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
FeaturedOpinion

ISC2 anti-scammer guidance

2 Mins read
The Caribbean Chapter of the ISC2 has issued guidance and advice for internet users facing phishing messages and WhatsApp scams.
BitDepthFeatured

What keeps regional cybersecurity experts awake at night

4 Mins read
Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.
BitDepthFeatured

Where hackers begin

3 Mins read
Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Ben
Ben
1 year ago

Stop relying on international partners. Build some capability internally and pay for prevention. It’s cheaper than remediation.

trackback
1 year ago

[…] TechNewsTT article, TSTT issues update on “cybersecurity issue” Claims no customer passwords or credentials in dump […]

×
FeaturedNews Briefs

Parasram warns of possible GDPR fines after assessing TSTT data dump

2
0
Share your perspective in the comments!x
()
x