Dutch telecommunications supplier Odido is warning that it suffered a cyberattack that reportedly uncovered the private information of 6.2 million clients.
Odido is likely one of the largest cell and telecommunications suppliers within the Netherlands, providing cell, broadband, and tv companies to thousands and thousands of shoppers nationwide. The corporate was fashioned in 2023 by means of the rebranding of T-Cell Netherlands and Tele2 Netherlands.
The corporate says they detected the incident on the weekend of February 7 and launched an investigation with inner and exterior cybersecurity consultants.
Odido says that the attackers breached their buyer contact system, permitting them to obtain the private information of a lot of its clients.
“Odido has been hit by a cyberattack, which compromised buyer information,” warns the corporate.
“This concerned private information from a buyer contact system utilized by Odido. No passwords, name logs, or billing info had been affected.”
Odido informed Nu.nl that the breach impacts 6.2 million clients, and that the menace actors contacted the corporate to say they stole thousands and thousands of information.
After studying of the breach, Odido says they instantly blocked the unauthorized entry to its buyer contact info and reported the breach to the Dutch Data Safety Authority (Autoriteit Persoonsgegevens).
Odido says the uncovered info varies per buyer however might embrace:
- Full title
- Handle and place of residence
- Cell quantity
- Buyer quantity
- Electronic mail handle
- IBAN (account quantity)
- Date of beginning
- Identification information (passport or driver’s license quantity and validity)
Nonetheless, the corporate emphasised that passwords, name information, location information, bill particulars, and scans of identification paperwork weren’t affected.
The corporate is now emailing all impacted clients who ought to obtain the notification inside 48 hours.
Odido says it has now blocked the unauthorized entry, strengthened security controls, elevated monitoring for suspicious exercise, and engaged exterior cybersecurity consultants to help with incident response and mitigation.
Presently, BleepingComputer has discovered no proof that the info has been publicly leaked or who’s behind the assault.
Trendy IT infrastructure strikes sooner than guide workflows can deal with.
On this new Tines information, learn the way your staff can scale back hidden guide delays, enhance reliability by means of automated response, and construct and scale clever workflows on high of instruments you already use.




