Canada's fourth largest mobile network operator, Freedom Mobile, announced this week that they have suffered a data breach through a third party service provider. 

vpnMentor disclosed on Tuesday that its researchers had identified an unprotected database containing information on Freedom Mobile customers, including email addresses, phone numbers, addresses, birth dates, IP addresses, credit scores, unencrypted payment card data with CVV codes, and account details. 

vpnMentor claimed the unprotected database contained at least 5 million records belonging to 1.5 million users, but Freedom Mobile has since announced publicly that these figures are not accurate. 

Freedom Mobile's investigation into the matter found that the database stored details on only 15,000 customers who had opened or made any changes to their accounts at 17 Freedom Mobile retail locations between March 25 and April 16 - a stark difference from vpnMentor's findings. 

In a statement to SecurityWeek, a Freedom Mobile spokesperson claimed, "Any reference to 1.5 million customers affected is inaccurate – the researchers could be referencing the number of lines of data exposed but it is certainly not a reference to the number of customers affected."

The company blamed the data breach on Apptium Technologies, a company contracted to help streamline its retail customer support processes. 

Freedom Mobile first learned of the unprotected database on April 18 and addressed the incident on April 23, claiming to have taken action once verifying the legitimacy of the researchers' emails. 

To prevent being the next targeted organization, breach prevention (system hardening, vulnerability management) and breach detection (file integrity monitoring, breach detection) solutions must be implemented and Security Best Practices must be met. Namely, removing vulnerabilities then maintaining Hardened System Integrity through intelligent change control. It is only by spotting the breach in time that an organization has any chance of effectively managing security.

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

USA Offices

New Net Technologies LLC
4850 Tamiami Trail, Suite 301
Naples, Florida, 34103

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]

 

UK Office

New Net Technologies Ltd
The Russell Building, West Common
Harpenden, Hertfordshire
AL5 2JQ

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2022, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.