TalkTalk Breach (2015)
Published: 19 October 2020
TalkTalk suffered a series of security issues in 2015. Right from the start of the year people were discussing an increased number of scam calls. On 26 February 2015 TalkTalk emailed customers to inform them of a data breach in which account numbers, addresses, and phone numbers were taken. The email detailed that a third-party contractor was believed to be responsible, and that TalkTalk was taking legal action against them. It was believed that “a few thousand” customers were affected.
On 10 August 2017, TalkTalk were fined again for failing to adequately protect personal data “because it allowed staff to have access to large quantities of customer’s data” which “left the data open to exploitation by rogue employees”.
However, this was not the only breach announcement TalkTalk dealt with in 2015. In October 2015 TalkTalk released a statement on their website that they had suffered a “significant and sustained cyberattack” on 21 October 2015. It stated that an investigation was ongoing but that data may have been stolen. On 22 October 2015 TalkTalk reported the data breach to the ICO.
The ICO stated that the attack took place between 15 October and 21 October 2015, and that 156,959 customers information was stolen, including names, addresses, dates of birth, phone numbers, and email addresses. Plus 15,656 band account details and sort codes. The ICO statement said “TalkTalk’s failure to implement the most basic cyber security measures allowed hackers to penetrate TalkTalk’s systems with ease.” The actual vulnerable system was described as part of Tiscali’s infrastructure – which TalkTalk had acquired in 2009.
Two other SQL injection attacks were noted by the ICO, one marked as “successful” taking place on 17 July 2015 and another between 2 September and 3 September 2015.
On 3 November 2015 the Culture, Media and Sport Committee launches an inquiry into the circumstances surrounding the breach, although the committee report wasn’t published until June 2016. On 15 December 2015 the (now former) CEO Dido Harding gives evidence. During this evidence Harding stated “there has only been one successful attack on our systems”, this is later contradicted by the ICO.
As part of this evidence Harding stated that TalkTalk “was going through the accreditation process to the Cyber Essentials programme.” The inquiry report stated that TalkTalk had reported 14 data breaches to the ICO over the two years previous to the breach, and that the ICO’s enforcement section of 30 staff were dealing with approximately 1,000 cases at any given time, plus 200,000 “public concerns” per year.
Interestingly, the report states “a portion of CEO compensation should be linkted to effective cyber security, in a way to be decided by the Board” and that “it would be highly unusual for the CEO of a company to have to resign over an attack.” Which is interesting when considering the Target Breach of 2013 – the Target Breach story broke on 18 December 2013 and the CEO resigned on 5 May 2014; that’s 4 months and 17 days after the breach.
TalkTalk’s board took the decision to go public with the breach within a day of finding out about the breach, although it took two weeks to determine how many customers were affected.
In March 2016, TalkTalk announced that it would introduce voice biometric passwords for customers to access their accounts; they were the first UK ISP to do so. [Editors note: the WSJ reported that a company were scammed, in March 2019, through a computer generated fake voice call]
On 5 October 2016, TalkTalk was fined £400,000 for their October 2015 breach. This was the highest fine that had been given at the time, the previous highest being £350,000 issued against Prodial, a SPAM calling company.
On 13th December 2016, a youth was sentenced to a 12-month youth rehabilitation order over the breach, after he previously admitted seven offences related to hacking, he was 16 at the time of the offence. The Register, links this with Elliot Guntun, who later plead guilty to breaching a Sexual Harm Prevention Order (SPHO) – The Register reports, the “Police said they had found indecent images of children on the then 16 year old’s devices”.
Further, the BBC report that Gunton is accused of computer fraud involving $800,000, in the US, and is therefore facing charges of wire fraud and aggregated identity theft which could result in a 20 year sentence. Following this his parents have been charged due to helping him transfer cryptocurrency, they received a five-month and three-month jail sentence, both suspended for a year.
On 19th November 2018, Matthew Hanley and Connor Allsopp were jailed for 12 months and 8 months respectively for their part in the breach.
On 10th June 2019, Daniel Kelly, after pleading guilty to 11 hacking-related offences in 2016, was sentenced to four years detention in a young offender’s institute. Kelley was 18 years old at the time of his arrest. He not only took part in the TalkTalk attack but also reportedly attempted to blackmail former CEO Dido Harding, demanding the equivalent of £80,000 in bitcoin, although the Crown Prosecution Service dropped the blackmail charge.
|2009||Tiscali infrastructure is acquired, which is later breached in October 2015|
|26 February 2015||TalkTalk announces a breach|
|17 July 2015||A successful SQL Injection attack affects TalkTalk|
|2 September 2015||Another SQL Injection attack affects TalkTalk|
|15 October 2015||Another successful SQL Injection attack affects TakTalk|
|21 October 2015||TalkTalk announces a breach|
|22 October 2015||TalkTalk reports the breach to the ICO|
|3 November 2015||Culture, Media and Sport Committee launches an enquiry into the breach|
|15 December 2015||Former CEO, Dido Harding, delivers oral evidence to the Committee|
|17 March 2016||TalkTalk intrduces voice biometrics|
|20 June 2016||The Committee report is published|
|5 October 2016||TalkTalk fined £400,000 by the ICO|
|10 August 2017||TalkTalk fined £100,000 by the ICO|
Posts broken down by category
Articles concentrating on network and operating system level attacks.
Articles covering attacks against web applications and their associated APIS.
Articles concentrating on past data breaches, looking for lessons learned.
Articles covering breaking into wireless networks and how to keep them safe.