• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

8.7 million customer Data Breached from Russian ISP

6064

Recently the data of 8.7 million Beeline customers including personal details such as full names, addresses, and mobile and home phone numbers.was sold and shared online.

Beeline is a Russian telecommunications company with clients in Russia, all of Asia, and Australia admitted to the breach.

Beeline told Kommersant, a Russian News Agency that this incident happened in 2017 and that they found the persons responsible at the time, although they never made the hack public.Also, it said that only the data on Russian customers who signed up for home broadband connections, before November 2016.

The vast majority of the leaked data was from users who are not Beeline customers anymore, the company said. Customers in Australia, New Zeeland, Kazahstan, Armenia, or other countries where the ISP has a presence, were not impacted.

Beeline has more than 50 million subscribers in Russia but said that only 3 million are broadband customers, with the bulk being mobile subscribers.

Tags:
owen
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 0 )

No questions available

Related Forums in 8.7 million customer Data Breached from Russian ISP

Related Forums in 8.7 million customer Data Breached from Russian ISP

Web Server
christian class=
Tool to scan the vulnerabilities in web server
Apr 21, 2017
Breach-vulnerability
markdjokovic class=
clear the frozen emails in exim
Sep 26, 2018
Breach-vulnerability
joshwariddin class=
script injection vulnerabilities
Sep 25, 2018

Related News in 8.7 million customer Data Breached from Russian ISP

Related News in 8.7 million customer Data Breached from Russian ISP

Cisco releases patches for several of its products
Cisco releases patches for several of its products
Apr 7, 2017
Schools are the most common cybercrime targets - ESET
Schools are the most common cybercrime targets - ESET
May 3, 2017
Samba vulnerability calls to mind WannaCry fears to Linux/ UNIX
Samba vulnerability calls to mind WannaCry fears to Linux/ UNIX
May 30, 2017
Patches available for Linux Sudo vulnerability
Patches available for Linux Sudo vulnerability
Jun 1, 2017
Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration
Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration
May 24, 2017
New Security Breach at Avast Aimed at Its Ccleaner Software
New Security Breach at Avast Aimed at Its Ccleaner Software
Oct 26, 2019
The database was liked by the by Vistaprint that exposed the customer details
The database was liked by the by Vistaprint that exposed the customer details
Nov 27, 2019
8.7 million customer Data Breached from Russian ISP
8.7 million customer Data Breached from Russian ISP
Oct 15, 2019
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Lucas ?
Various options in Top command

Am using Top command only to view the load average, what are the various options in Top command..??

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.