Telus investigating sale of alleged code, staff information

A person on a felony discussion board is marketing what they assert is data on all Telus staff members, as effectively as the Canadian telecommunications company’s GitHub computer software code repositories.

In reaction to an IT Entire world Canada reporter’s query about the putting up, Telus director of public affairs Richard Gilhooley mentioned the firm is wanting into the allegation.

“We are investigating promises that a small volume of details associated to inner Telus resource code and select Telus team members’ information has appeared on the dark net,” he said in an e mail. “We can affirm that to this position our investigation, which we introduced as quickly as we were produced conscious of the incident, has not determined any company or retail buyer knowledge.”

The 1st darkish world-wide-web submitting by somebody named “Sieze” was made on Feb. 17. “Today we’re advertising email lists of Telus workforce from a extremely the latest breach,” it suggests. “We have around 76k distinctive emails and on prime of this have internal information involved with each individual worker scraped from Telus’ API.”

As evidence, this submitting consists of what appears to be a record of Telus personnel electronic mail addresses. It isn’t acknowledged if these are latest or previous team — or even actual.

A Feb. 21 submitting provides, “We’re bringing you even far more from the recent Telus breach!” The poster asks US$7K for the database file of “every man or woman that performs at Telus” US$6K for a payroll file with 770 data of “all of the white collar personnel … such as the president of Telus” and US$50K for all of the allegedly copied facts, such as a list of Telus non-public Github repositories, subdomains, and screenshots.

Interested consumers are asked to join to 1 of two men and women on the Telegram messaging provider.

It’s essential to notice that it’s not apparent no matter whether the info currently being offered is serious, commented Brett Callow, a British Columbia-primarily based danger analyst for Emsisoft. “That stated, if it is real, this is a possibly really serious incident which exposes Telus’ workforce to elevated possibility of phishing and social engineering and, by extension, exposes the company’s customers’ to threat. The alleged exposure of the non-public Github repositories, supposedly including a sim-swap API, represents an extra tier of possibly significant chance.”

In 2020, a Telus division known as Medisys Wellness Team was hit by a cyber attack involving purchaser info. At that time the enterprise said it “securely retrieved the knowledge by making a payment.”