Light Reading
Customer data stolen in security breach that could lead to phishing attacks on subscribers.

Orange France Hacked

Ray Le Maistre
5/8/2014
50%
50%

The personal details of about 1.3 million Orange France customers were stolen by hackers in April, the operator has admitted.

Details including the name, date of birth, fixed and mobile numbers, and email addresses (but not bank details) were stolen in a security breach that was discovered on April 18. The operator has warned that the information stolen could be used in phishing attacks on customers whose details were compromised.

Orange France admitted earlier this year that the personal information of about 800,000 customers was stolen during January.

The data breach highlights the constant struggle that operators face to keep their customers' data secure, a struggle that will be discussed at the upcoming Mobile Network Security Strategies conference in London, which will take place on May 21 at The Thistle Marble Arch hotel.

Patrick Donegan, Heavy Reading senior analyst and mobile network security expert who is hosting the conference, says operators need to consider their levels of investment in security systems, especially as they deploy new networks.

"Information security has always been a strong differentiator for telcos," says Donegan. "In the all-IP networking era, telcos need to increase investment in their own internal security processes as well as their network defenses. It's critical for telcos that their customers understand that they are their most trusted ally in the battle against attacks on private information, no matter who or where they come from."

That trust will come under increasing scrutiny, though, if such breaches become more commonplace. Ironically, Orange only recently conducted a survey which found that consumers are becoming increasingly concerned about the data being stored about them by third-party organizations such as communications service providers, handset manufacturers, and social media networks. (See Euronews: Consumers Freak Out Over Data Security.)

That concern will only increase if operators fail to tell their customers of such security breaches in a timely fashion.

George Anderson, a director at security technology specialist Webroot Software Inc. , is surprised by "the length of time between the attack happening and it becoming public knowledge -- almost three weeks -- especially as the data stolen is ideal for phishing subscribers using email, SMS and phone calls. Most phishing sites are 'live' for just a few hours and the phishing attack is often indistinguishable from genuine communications and requests. That's why it's vital that Orange France customers, the potential victims, are made aware of any threat to them immediately," said Anderson in comments emailed to Light Reading.

Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading


Want to learn more about this topic? Check out the agenda for Mobile Network Security Strategies, which will take place on May 21 at The Thistle Marble Arch hotel in London. For more on the event, including the stellar service provider speaker line-up, see the event's official site.


(7)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
DOShea
50%
50%
DOShea,
User Rank: Blogger
5/11/2014 | 5:08:20 PM
Re: slow reaction time
Breaches like this will hopefull force operators to really tell customers how they protect their data throughout the value chain. Everyone claims high levels of security, and customers don't really know from one carrier to the next the different approaches that are being taken.
MordyK
50%
50%
MordyK,
User Rank: Light Sabre
5/9/2014 | 2:33:31 PM
Re: Value of data
The market bears me out :)
SarahReedy
50%
50%
SarahReedy,
User Rank: Blogger
5/9/2014 | 2:13:49 PM
Re: slow reaction time
I think it requires protective measures at every step of the value chain from the network to the web to end user devices. Right now, there are a lot of holes where things can go wrong.
SarahReedy
50%
50%
SarahReedy,
User Rank: Blogger
5/9/2014 | 2:12:55 PM
Re: Value of data
ha, so cybercriminals are better at big-data analytics than operators? Not too far off...
MordyK
50%
50%
MordyK,
User Rank: Light Sabre
5/8/2014 | 9:33:14 PM
Value of data
The joke is that while carrier's bsaically don't recognise the data's potential, hacker's recognise the locked up value and make attempts to get at it.

The upside of this is that business work on market economics, so attempts at getting this data highlight its potential value opportunity. 
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
5/8/2014 | 2:29:36 PM
Re: slow reaction time
Phishing and other types of social hacking are becoming a major problem. I am hoping that sometime soon we can come to a consensus on the web for digital identities to thwart this growing problem. 

The issue is that there are almost a byzantine array of solutions being developed. Two-auth is a nice stepping stone, but then you get into biometrics that can open up a host of issues that have never been considered. 
SarahReedy
50%
50%
SarahReedy,
User Rank: Blogger
5/8/2014 | 12:55:07 PM
slow reaction time
Wow, it would seem that time is of the essence in any security breach like this so that customers can take necessary precautions to protect their identities. Is Orange advising them on what to do now, or is it too late?
Flash Poll
From The Founder
It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
LRTV Custom TV
Using Service Quality to Drive WiFi Monetization

10|22|14   |   6:51   |   (0) comments


Live from the SCTE conference: Heavy Reading's Alan Breznick explores the forces shaping the WiFi opportunity in an interview with CableLabs' Justin Colwell and Amdocs' Ken Roulier.
LRTV Custom TV
Distributed Access Architectures – 2

10|21|14   |   8:51:00 AM   |   (0) comments


ARRIS CTO Network Solutions Tom Cloonan discusses why many if not most MSOs will continue with integrated CCAP, while addressing why some are also looking at two futuristic, distributed access architectures: Remote PHY and Remote CCAP.
LRTV Custom TV
Distributed Access Architectures – 1

10|21|14   |   9:01   |   (0) comments


SCTE Sr. Director of Engineering Dean Stoneback discusses the pros and cons of distributed access architecture (DAA) and its various forms, which range from basic Remote PHY to full CMTS functionality in the node.
LRTV Custom TV
The WiFi Road to Riches – 2

10|21|14   |   3:58   |   (0) comments


ARRIS Senior Solution Architect Eli Baruch talks about how MSOs can enable public and community WiFi through 1) outdoor access points, 2) businesses seeking to offer WiFi to customers, and 3) residential WiFi gateway extensions.
LRTV Custom TV
The WiFi Road to Riches – 1

10|21|14   |   10:15   |   (0) comments


SCTE Director of Advanced Technologies Steve Harris discusses WiFi deployments, drivers, challenges and advances, including 802.11ac, carrier-grade WiFi, community WiFi, Hotspot 2.0, Passpoint, WiFi-First and voice-over-WiFi.
LRTV Custom TV
Advantech Accelerates 100G Traffic Handling

10|17|14   |   7:56   |   (0) comments


Paul Stevens from Advantech explains why handling 100GbE needs a whole new platform design approach and how Advantech is addressing the needs of equipment providers and carriers to give them the flexibility and performance they will need for SDN and NFV deployment.
LRTV Huawei Video Resource Center
Holland's Imtech Traffic & Infra Discusses Huawei's ICT Solution and Services

10|16|14   |   4:49   |   (0) comments


Dimitry Theebe is from the business unit at Imtech Traffic & Infra which delivers communications solutions for transportations. His partnershp with Huawei began about a years ago. In this video, Theebe speaks more about this partnership and what he hopes to accomplish with Huawei.
LRTV Huawei Video Resource Center
Huawei's Comprehensive Storage Solutions Vital for SVR

10|16|14   |   6:16   |   (0) comments


SVR Information Technology provides cloud services for academic and special sectors. With Huawei's support, SVR and Yildiz Technical University has established Turkey's largest and most advanced High Performance Computing system. CSO Ismail Cem Aslan talks about what he hopes Huawei's OceanStor storage system will bring for him.
LRTV Huawei Video Resource Center
Mexico's Servitron's Impression of Huawei at CCW 2014

10|16|14   |   6:35   |   (0) comments


Servitron is a network operator in Mexico that has been in the trunking industry for the past 20 years. Its COO, Ing. Ragnar Trillo O., explains at Critical Communications World 2014 that his company has been interested in the long-term evolution of LTE technology and its adoption for TETRA.
LRTV Huawei Video Resource Center
Building a Better Dubai

10|16|14   |   2:06   |   (0) comments


Abdulla Ahmed Al Falasi is the director of commercial affairs, a telecommunications coordinator for the government of Dubai. Their areas of service span across multiple industries, including police, safety, shopping malls and more. In this video, Abdulla talks about his department's work with Huawei.
LRTV Huawei Video Resource Center
Huawei Lights Up Malaysia Partner Maju Nusa

10|16|14   |   1:59   |   (0) comments


Malaysia's Maju Nusa is an enterprise partner to Huawei in networking, route switches and telco equipment. At this year's Critical Communications World in Singapore, CTO Pushpender Singh talks about what Huawei's eLTE solutions mean to his company and for Malaysia.
LRTV Custom TV
Evolving From HFC to FTTH Networks

10|15|14   |   2:19   |   (0) comments


Cisco's Todd McCrum delves into the future of cable's HFC plant, examining how DOCSIS 3.1 and advanced video compression will extend its life and how the IP video transition will usher in GPON and EPON over FTTH.
Upcoming Live Events
October 29, 2014, New York City
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 3, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
February 10, 2015, Atlanta, GA
June 9-10, 2015, Chicago, IL
Infographics
WhoIsHostingThis.com presents six of the world's most extreme WiFi hotspots, enabling the most epic selfies you can imagine.
Hot Topics
Google: Carriers & Cloud Providers Need to Cooperate
Mitch Wagner, West Coast Bureau Chief, Light Reading, 10/16/2014
Could Data Be the New 'Currency'?
Ray Le Maistre, Editor-in-chief, 10/16/2014
iPad Air 2 Lets Users Switch Carriers Any Time
Mitch Wagner, West Coast Bureau Chief, Light Reading, 10/17/2014
Analysts Warn of Major NFV Gaps
Carol Wilson, Editor-at-large, 10/22/2014
CBS Takes OTT Plunge
Mari Silbey, Independent Technology Editor, 10/16/2014
Like Us on Facebook
Twitter Feed