The New York-based telecommunications company, Verizon Enterprise Solutions, has recently suffered from a security breach on their enterprise client portal.

Known for the infamous Data Breach Investigation Report, this seemingly ironic and unfortunate situation has 1.5 million Verizon customers vulnerable to attack, as security expert Brian Krebs reported that a dark-web forum was advertising the sale of a database containing contact information belonging to Verizon Enterprise customers.  

The database was being priced at a whopping $100,000, but hackers were able to buy segmented portions of the list for $10,000 per section. Information on security vulnerabilities found on Verizon’s website was also available to purchase on the black market forum.

According to Krebs, Verizon was already aware of the security incident and made a statement to the media claiming: “Verizon recently discovered and remediated a security vulnerability on our enterprise client portal. Our investigation to date found an attacker obtained basic contact information on a number of our enterprise customers. No customer proprietary network information (CPNI) or other data was accessed or accessible.”

While it’s comforting to know that only basic contact information was compromised during this specific breach, many of Verizon’s customers belong to Fortune 500 companies, and will now be the prime target for phishing attacks. Verizon Enterprise customers must be careful to not click on any suspicious links or provide personal information to anyone via email, as they may be working to steal your identity.

Furthermore, CEO of Identity Finder, Todd Feinman, claims that online scammers often piece together data stolen from several different outlets until they have enough information to do major damage. “We’ll see more and more of these sensitive data breaches being correlated together so that sensitive contact information can be combined with sensitive password dumps and other data to wreak havoc on other businesses and individuals.”

While Verizon’s been known to be a highly respected voice on all things security, no one is safe from attack, even those who work to prevent and detect such data breaches. These breaches show us all that even with an armory of security products and correctly operated security best practices, you can never guarantee that a breach won’t happen. Exploits exist long before they are ever discovered and the best that you can hope for is that you don’t get breached before you have been able to remediate.

That being said, prevention measures are still essential and effective but do not guarantee systems are ever 100% hack-proof. Host intrusion detection technology performs a vital contingency function- if and when defenses are breached, you are alerted and able to take action before data theft and damage goes too far.


Read this article on SC Magazine



The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2023, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.