Feeds

Security breach at Belgacom exposed

Protest against download limits

Next gen security for virtualised datacentres

Belgacom, the largest Belgian ISP, admitted today that 2,000 of its ADSL accounts were compromised earlier this year.

The company discovered details of its subscribers posted on a webpage by hackers who weren’t happy with download limits on broadband internet connections.

In Belgium, about 90 per cent of residential ISP customers are connected either via Belgacom (the former state telephone monopoly) or Telenet (cable). Although the connections are fast, both ISPs last year had a maximum download limit of 12 GB/month. Go past this limit and speeds would immediately drop to 3 KB/s for the rest of the month, hardly enough to read your mail.

In December frustrated Belgian internet users signed a petition demanding more reasonable download limits and on 30 December tried to download as much as possible to show Internet traffic wasn't significantly higher than on other days. Apparently a group of disgruntled users decided that wasn't enough, and exposed the details 2,000 Belgacom accounts to the web.

Belgacom didn't communicate the security breach to its users at large, apparently to avoid panic.

"We sent postal letters to small groups of users since April and asked them to change passwords as a matter of precaution," Belgacom spokesperson Jan Margot told The Register. "The site was closed down immediately, and we haven't seen any abuse since then."

Belgacom insists it is a minor issue. "We have 1 million ADSL users, it wasn't a big threat." ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.