Press Releases

TSTT issues update on “cybersecurity issue” Claims no customer passwords or credentials in dump

3 Mins read

As a follow-up to our previous statement regarding the cyber security issue and the company’s ongoing investigation, we are providing the following update to address third party statements that have been in the public domain since our last release, some of which are erroneous, mischievous, and damaging.

Background and Context

TSTT reiterates that it is committed to safeguarding the safety and security of customers’ information and takes matters related to cyber security seriously. Cyber threats are a continuous feature of modern digital operating systems and have become increasingly sophisticated and their frequency has increased significantly. Telecommunications infrastructure is no exception to these threats and incursions.

TSTT has continuously invested millions of dollars in resources in its processes and IT infrastructure to protect its systems and the data it produces and stores. On October 09, 2023, cyber attackers attempted to gain unauthorised access to TSTT’s systems. The company took immediate steps to minimise the security vulnerability, successfully isolating its systems and applications. These applications were subsequently quarantined, rebuilt and put back into production as part of clearly defined policies and procedures.

The company also enlisted the support of internationally recognised cyber security experts and partners in investigating the attempted breach and advising on the implementation of appropriate additional security measures and protocols. Some of these recommendations have already been implemented.

Analysing the data

During the past seven days, TSTT has been working with its international cyber security experts and has undertaken a rigorous examination of data published on the dark web after a ransomware group claimed ownership of a cyberattack on the telecommunications company.

Although the published material was easily accessible, the corroboration process was time consuming because it required cross referencing data across multiple extensive databases to verify sources. With the support of our cyber security consultants, the company has determined that the data released contains largely identifying information, and TSTT apologises to those customers whose information was accessed by these cyber terrorists

While the company is still scrutinising the data, the 6GB accessed represents less than 1% of the petabytes of data the company produces and stores. Moreover, it represents information of a small subset of TSTT’s customer base. A single customer could generate hundreds or thousands of records of non-critical, non-sensitive transactions. The majority of TSTT’s customers’ information was not accessed.

It was also determined that some of the data was accessed from a legacy system, which is no longer utilised by TSTT but which contains data that is, in many instances, no longer valid. This data is kept to ensure TSTT is compliant with relevant laws as it relates to retention of customer information.

With this context, the subset of information accessed contains the following parameters…

What is included What is not included
First Name Call records
Last Name Transactional data
Email Address Customer Passwords
Home Address Credit card information
ID Scans (limited amount) Financial information
Some customer account information, (Account #, billing addresses, and some mobile numbers)
Letters of authorisation: this permits someone to conduct transactions with TSTT on someone’s behalf
Payment receipts

TSTT’s investigation has found that no customer passwords or credentials were accessed.

Due to the nature of the data accessed, internal and external security analysts have advised that there is no elevated risk of fraudulent activity for the group of customers impacted. Some of the information can already be easily accessed via the telephone directory’s white pages. However, TSTT reminds all customers to be vigilant and alert to potential scams and fraudulent activity and report them where necessary.

 It is important to note that certain statements currently in the public domain regarding the publication of personal data are inaccurate and invalid. TSTT does not request, require and/or store on its databases any of the following information related to its customers:

  • Credit Card information
  • Customer passwords
  • Approvals for housing
  • Shipping documents

There is therefore little chance of such information being accessed or published because of the cyber incursion. This underscores the importance of verifying the source and validity of any information or data in the public domain.

Data Centre

TSTT also wishes to address false, misleading, and damaging statements regarding its data centre. TSTT’s data centre (TIA 942-B, Rated 3, SOC-2, DCOS Maturity Level 3 and ISO) is the most secure, resilient and reliable data centre in Trinidad and Tobago, the Caribbean and ranked highly in the Latin American region.

TSTT categorically refutes claims that its data centre was breached and therefore any claims of our corporate client data or credentials being accessed as a result of an alleged breach of our data centre is totally inaccurate, ill-informed and mischievous.

We strongly urge responsible parties to exercise utmost caution and responsibility when publishing and disseminating information. Due to the sensitive nature of this, it is imperative to verify and obtain information from credible and expert sources, as inaccurate and misleading reports can misinform and potentially damage public trust and also harm our company.

This is why TSTT is taking meticulous steps to thoroughly verify all information. We also urge members of the public to exercise discernment in the information they consume, ensuring they receive it from credible and reputable sources to make well-informed decisions.

Related posts

Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
Choosing the best KYC verification tool for your business

Choosing the best KYC verification tool for your business

Fraud attempts today are much more advanced with the use of fake IDs. deepfakes, synthetic identities, and account takeovers.
Read More
Media monitoring in today’s information economy

Media monitoring in today’s information economy

Companies must strike a balance between the desire to be enlightened and the need to observe individual rights and social values.
Read More
What Does Your Music Say About You?

What Does Your Music Say About You?

The virality of “musical age” reflects a deeper pattern: algorithms have blurred generational boundaries.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
TSTT, PSA announce Affinity Plan for 16,000 members

TSTT, PSA announce Affinity Plan for 16,000 members

PSA members have access to bundles that combine mobile, broadband internet, TV/landline, and home security services at discounted rates.
Read More
Vendor screening: Why it matters for compliance, security, and partnership

Vendor screening: Why it matters for compliance, security, and partnership

Current regulatory demands require organizations to maintain constant oversight of vendor operations throughout the entire relationship
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Personalization will be the core of the next tech revolution

Personalization will be the core of the next tech revolution

Personalization is no longer a marketing add-on. It is the backbone of the next technology wave.
Read More
WiDay 2025 – WiPay’s five-pillar ecosystem

WiDay 2025 – WiPay’s five-pillar ecosystem

Wayne underscored WiPay’s role in bringing the unbanked online through a cash-to-digital voucher network.
Read More
Digital New Year’s resolutions Digital New Year’s resolutions
Choosing the best KYC verification tool for your business Choosing the best KYC verification tool...
Media monitoring in today’s information economy Media monitoring in today’s information economy
What Does Your Music Say About You? What Does Your Music Say About...
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
TSTT, PSA announce Affinity Plan for 16,000 members TSTT, PSA announce Affinity Plan for...
Vendor screening: Why it matters for compliance, security, and partnership Vendor screening: Why it matters for...
Old Mac, new OS Old Mac, new OS
Personalization will be the core of the next tech revolution Personalization will be the core of...
WiDay 2025 – WiPay’s five-pillar ecosystem WiDay 2025 – WiPay’s five-pillar ecosystem

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
Press Releases

TSTT, PSA announce Affinity Plan for 16,000 members

2 Mins read
PSA members have access to bundles that combine mobile, broadband internet, TV/landline, and home security services at discounted rates.
BitDepthFeatured

Regional cybersecurity faces fire

4 Mins read
Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
BitDepthFeatured

Encryption, privacy and public safety

4 Mins read
Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Ben
Ben
2 years ago

Stop relying on international partners. Build some capability internally and pay for prevention. It’s cheaper than remediation.

trackback
2 years ago

[…] TechNewsTT article, TSTT issues update on “cybersecurity issue” Claims no customer passwords or credentials in dump […]

×
FeaturedNews Briefs

Parasram warns of possible GDPR fines after assessing TSTT data dump

2
0
Share your perspective in the comments!x
()
x