Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

Teen Arrested in Connection With TalkTalk Breach

A 15-year-old boy from Northern Ireland was arrested on Monday in connection to the recent cyberattack on British phone and broadband services provider TalkTalk.

A 15-year-old boy from Northern Ireland was arrested on Monday in connection to the recent cyberattack on British phone and broadband services provider TalkTalk.

According to Scotland Yard, the teen was arrested on suspicion of committing offences under the Computer Misuse Act as part of the investigation into the alleged theft of data from TalkTalk’s website.

Officers from the Police Service of Northern Ireland, working with detectives from the Metropolitan Police’s Cyber Crime Unit, arrested the boy at an address in County Antrim and searched the location. The suspect, whose name has not been made public, was interviewed at the County Antrim police station where he had been taken into custody.

“TalkTalk can confirm that we have been informed by the Metropolitan Police of the arrest of a suspect in connection with the cyber attack on our website on 21st October 2015. We know this has been a worrying time for customers and we are grateful for the swift response and hard work of the Police. We will continue to assist in the ongoing investigation,” TalkTalk stated after news of the arrest broke.

In the meantime, more information has emerged regarding the breach and its impact. In a notice posted on its TalkTalk Business website, the telecoms firm revealed that the hacker attack also affects current and previous small business customers who conducted online transactions. The company says other business customers are not impacted.

In an updated statement published over the weekend, TalkTalk attempted to downplay the breach, saying that only the firm’s website was hit and not its core systems. Furthermore, the website does not store complete payment card details and the company expects the amount of exposed financial data to be lower than initially believed.

TalkTalk CEO Dido Harding said on Monday that while the attackers might have accessed complete bank account numbers and sort codes, this information alone is not enough to steal money from victims’ accounts.

The information possibly accessed by the attackers — names, addresses, dates of birth, email addresses, phone numbers, TalkTalk account details, partial payment card data, and bank details — can be leveraged by malicious actors in social engineering attacks whose goal is to obtain sensitive information. That is why TalkTalk has informed customers that the company will never call or email them to request information or ask them to install software on their computers.

Advertisement. Scroll to continue reading.

It’s believed that the attackers leveraged a SQL injection vulnerability to gain access to TalkTalk customer information. Experts say the cybercriminals likely used a distributed denial-of-service (DDoS) attack against the company’s website as a smokescreen that allowed them to hide their other malicious activities.

Someone also attempted to blackmail TalkTalk following the incident, reportedly demanding roughly $122,000 in Bitcoin to prevent the stolen data from being leaked.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

CISO Strategy

The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks.

Cybercrime

A global cyber espionage campaign has resulted in the networks of many organizations around the world becoming compromised after the attackers managed to breach...

Cybercrime

A look into recent cryptocurrency tracing and recovery operations by the FBI and UK’s Metropolitan Police