& cplSiteName &

Orange France Hacked

Ray Le Maistre
5/8/2014
50%
50%

The personal details of about 1.3 million Orange France customers were stolen by hackers in April, the operator has admitted.

Details including the name, date of birth, fixed and mobile numbers, and email addresses (but not bank details) were stolen in a security breach that was discovered on April 18. The operator has warned that the information stolen could be used in phishing attacks on customers whose details were compromised.

Orange France admitted earlier this year that the personal information of about 800,000 customers was stolen during January.

The data breach highlights the constant struggle that operators face to keep their customers' data secure, a struggle that will be discussed at the upcoming Mobile Network Security Strategies conference in London, which will take place on May 21 at The Thistle Marble Arch hotel.

Patrick Donegan, Heavy Reading senior analyst and mobile network security expert who is hosting the conference, says operators need to consider their levels of investment in security systems, especially as they deploy new networks.

"Information security has always been a strong differentiator for telcos," says Donegan. "In the all-IP networking era, telcos need to increase investment in their own internal security processes as well as their network defenses. It's critical for telcos that their customers understand that they are their most trusted ally in the battle against attacks on private information, no matter who or where they come from."

That trust will come under increasing scrutiny, though, if such breaches become more commonplace. Ironically, Orange only recently conducted a survey which found that consumers are becoming increasingly concerned about the data being stored about them by third-party organizations such as communications service providers, handset manufacturers, and social media networks. (See Euronews: Consumers Freak Out Over Data Security.)

That concern will only increase if operators fail to tell their customers of such security breaches in a timely fashion.

George Anderson, a director at security technology specialist Webroot Software Inc. , is surprised by "the length of time between the attack happening and it becoming public knowledge -- almost three weeks -- especially as the data stolen is ideal for phishing subscribers using email, SMS and phone calls. Most phishing sites are 'live' for just a few hours and the phishing attack is often indistinguishable from genuine communications and requests. That's why it's vital that Orange France customers, the potential victims, are made aware of any threat to them immediately," said Anderson in comments emailed to Light Reading.

— Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading


Want to learn more about this topic? Check out the agenda for Mobile Network Security Strategies, which will take place on May 21 at The Thistle Marble Arch hotel in London. For more on the event, including the stellar service provider speaker line-up, see the event's official site.


(7)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
DOShea
50%
50%
DOShea,
User Rank: Blogger
5/11/2014 | 5:08:20 PM
Re: slow reaction time
Breaches like this will hopefull force operators to really tell customers how they protect their data throughout the value chain. Everyone claims high levels of security, and customers don't really know from one carrier to the next the different approaches that are being taken.
MordyK
50%
50%
MordyK,
User Rank: Light Sabre
5/9/2014 | 2:33:31 PM
Re: Value of data
The market bears me out :)
Sarah Thomas
50%
50%
Sarah Thomas,
User Rank: Blogger
5/9/2014 | 2:13:49 PM
Re: slow reaction time
I think it requires protective measures at every step of the value chain from the network to the web to end user devices. Right now, there are a lot of holes where things can go wrong.
Sarah Thomas
50%
50%
Sarah Thomas,
User Rank: Blogger
5/9/2014 | 2:12:55 PM
Re: Value of data
ha, so cybercriminals are better at big-data analytics than operators? Not too far off...
MordyK
50%
50%
MordyK,
User Rank: Light Sabre
5/8/2014 | 9:33:14 PM
Value of data
The joke is that while carrier's bsaically don't recognise the data's potential, hacker's recognise the locked up value and make attempts to get at it.

The upside of this is that business work on market economics, so attempts at getting this data highlight its potential value opportunity. 
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
5/8/2014 | 2:29:36 PM
Re: slow reaction time
Phishing and other types of social hacking are becoming a major problem. I am hoping that sometime soon we can come to a consensus on the web for digital identities to thwart this growing problem. 

The issue is that there are almost a byzantine array of solutions being developed. Two-auth is a nice stepping stone, but then you get into biometrics that can open up a host of issues that have never been considered. 
Sarah Thomas
50%
50%
Sarah Thomas,
User Rank: Blogger
5/8/2014 | 12:55:07 PM
slow reaction time
Wow, it would seem that time is of the essence in any security breach like this so that customers can take necessary precautions to protect their identities. Is Orange advising them on what to do now, or is it too late?
From The Founder
Kicking off BCE 2017, Light Reading founder Steve Saunders lays blame for NFV's slow ramp-up and urges telecom to return to old-fashioned standards building and interoperability.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Custom TV
The Overall Objective Is to Win the Game

6|26|17   |     |   (0) comments


SCTE•ISBE's Chris Bastian discusses Energy 2020's success to date and the importance of a flexible approach that allows for changes in specific strategies in order to reach significant milestones.
LRTV Interviews
CenturyLink: Let's Get Past SD-WAN Hype

6|23|17   |   04:02   |   (0) comments


Technology becomes a "shiny object" unless it's properly focused on solving business needs for enterprise customers, says Bill Grubbs, network solutions architect for CenturyLink. He explains to Light Reading why SD-WAN deployments have to be tailored to specific needs – and more.
Women in Comms Introduction Videos
Infinera's Sales Director Paints Tech's Big Picture

6|21|17   |   4:14   |   (1) comment


Shannon Williams, Infinera's director of sales, shares how she achieves work's many balancing acts -- between her role and the broader company, today and tomorrow's tech and more.
LRTV Custom TV
SD-WAN Innovation & Trends

6|20|17   |     |   (0) comments


Versa CEO Kelly Ahuja discusses with Carol Wilson the current status and trends in the SD-WAN market, Versa's innovation around building a software platform with broad contextualization, and the advantages that startups can bring to the SD-WAN market.
LRTV Interviews
Ovum's Dario Talmesio on 5G in Europe

6|20|17   |   02:16   |   (0) comments


At 5G World 2017, Dario Talmesio, principal analyst and practice leader on Ovum's fixed and mobile telecoms European team, explains the emerging trends amongst European operators as they prepare for 5G.
LRTV Custom TV
Putting Power on a Pedestal

6|19|17   |     |   (0) comments


ARRIS's John Ulm says a major accomplishment of SCTE•ISBE's Energy 2020 program is increased focus on power cost and consumption, including inclusion of energy requirements in operators' RFPs and RFIs.
LRTV Custom TV
Gigabit Access: The Last-Mile Pipe for All Future Services

6|19|17   |     |   (0) comments


A Gigabit access platform being deployed today must be able to deliver all types of services to an increasing number of devices. A non-blocking architecture is necessary to support the ever-increasing growth in bandwidth demand. The Huawei Gigabit access solution is based on a distributed design that is fully scalable to deliver a unprecedented performance.
LRTV Custom TV
Key Factors to Successfully Deploy an SD-WAN Service

6|19|17   |     |   (0) comments


As service providers transition their SD-WAN solution from trials and limited deployments into production at large scale, there are important considerations to successfully operationalize these solutions and realize their full potential, without adding complexity, introducing uncertainty or disrupting current business operations. Sunil Khandekar, CEO and Founder ...
LRTV Custom TV
IoT Solutions: Rational Exuberance

6|19|17   |     |   (0) comments


IoT solutions are morphing from hype into viable business opportunities. Huawei has the platform and ecosystem support to help carriers successfully address new business opportunities in the IoT space.
LRTV Custom TV
Realizing ICN as a Network Slice for Mobile Data Distribution

6|19|17   |     |   (1) comment


Network slicing in 5G allows the potential introduction of new network architectures such as Information-centric Networks (ICN) as a slice, managed over a shared pool of compute, storage and bandwidth resource. Services over an ICN slice can benefit from many architectural features such as Name Based Networking, Security, Multicasting, Multi-homing, Mobility, ...
LRTV Interviews
Ovum's Mike Roberts on 5G Uptake

6|19|17   |   04:08   |   (0) comments


Mike Roberts, research director for Ovum's service provider markets group, explains why he has boosted his 5G subscriptions forecast.
LRTV Interviews
AT&T's Hubbard on Intersection of SD-WAN & MPLS

6|15|17   |     |   (0) comments


Rick Hubbard, SVP of Network Product Management for AT&T Business Solutions, discusses how AT&T's approach to SD-WAN fits in with its overall virtualization strategy, explains how SD-WAN can improve enterprise customers' use of the cloud and addresses the intersection of SD-WAN and MPLS.
Upcoming Live Events
October 18, 2017, Colorado Convention Center - Denver, CO
November 1, 2017, The Montcalm Marble Arch
November 1, 2017, The Montcalm Marble Arch
November 30, 2017, The Westin Times Square
All Upcoming Live Events
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
No Imagination: UK Chip Biz Goes Up for Sale
Iain Morris, News Editor, 6/22/2017
Does AT&T Deserve Time Warner?
Mari Silbey, Senior Editor, Cable/Video, 6/23/2017
Netflix's Lesson in Culture Expectation Settings
Sarah Thomas, Director, Women in Comms, 6/21/2017
Kalanick Steps Down as Uber CEO
Sarah Thomas, Director, Women in Comms, 6/21/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Following a recent board meeting, the New IP Agency (NIA) has a new strategy to help accelerate the adoption of NFV capabilities, explains the Agency's Founder and Secretary, Steve Saunders.
One of the nice bits of my job (other than the teeny tiny salary, obviously) is that I get to pick and choose who I interview for this slot on the Light Reading home ...
Animals with Phones
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.