Allphones hack exposes staff passwords

Powered by SC Magazine
 

Hacker claims 703 accounts listed.

Telecommunications retailer Allphones has had hundreds of staff usernames, passwords and company administrator logins exposed following a hacking attack.

The breach occurred when the company's web administration interface was accessed through a SQL injection attack that targeted the Allphones website. 
 
The affected webpage
The affected webpage
 
SC Magazine Australia informed the Allphones website designer of the breach including the vulnerable link and a captured HTML page of the admin console.
 
Further vulnerable links were later discovered and shut down, and affected accounts were disabled. 
 
Table names were visible on the administration console which was accessed by the hacker using the Havij SQL injection tool.
 
SC sighted a file that contains a sample of clear text staff usernames and passwords, along with store names, and a string of what appeared to be email addresses and passwords used to access the Allphones 'webclub' customer loyalty program.   
 
The hacker claimed 703 staff credentials were listed, along with 23,077 entries in the Allphones webclub. The sample contained 40 listings and many more duplicate entries. Four adminstrative passwords were also exposed.
 
Allphones has more than 170 locations across Australia, according to its website.
 
Allphones has been contacted for comment.

Copyright © SC Magazine, Australia


Allphones hack exposes staff passwords
Credit: Allphones Facebook page
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Credit: Allphones Facebook page
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 435

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 209

Vote