November 12, 2015 By Shane Schick 2 min read

Although executives said the overall impact of the TalkTalk hack may have been limited to only 4 percent of its customer base, the U.K. Internet service provider (ISP) could still be dealing with an estimated financial hit of $53 million.

BBC News reported that the total number of victims whose bank account codes and other data was stolen in the TalkTalk hack is now believed to be about 157,000. That’s a steep drop from its initial analysis following the cyberattack about two weeks ago, when the firm thought up to 1.2 million customers might have been affected. The FT said an additional 28,000 also had credit and debit card numbers stolen, but they were obscured in the records and would be unusable by the attackers.

Although the majority of the company’s customers will no doubt be relieved, the long-term consequences of the TalkTalk hack could be far-reaching. Beyond the financial repercussions the telecom firm faces, the incident has sparked a parliamentary inquiry into how cybercriminals were able to conduct a data breach so easily, Wired noted. The change in estimated victims may also raise some debate among security experts about whether companies should inform their entire customer base of an issue until they know more about the extent of the damage.

So far, police have arrested four teenagers in the investigation, but that doesn’t do much to address a more urgent matter: Ever since the TalkTalk hack, customers haven’t been able to access their accounts online, according to PCAdvisor. Though the company is offering some workarounds, it has also suggested customers monitor their accounts for any potential signs of data loss and remain vigilant against any phone scams or other possible attempts by cybercriminals to exploit the situation.

The other sore point in all this is the fact that the latest TalkTalk attack was the third it has experienced in 2015, Slashgear said. That means even if the incident doesn’t affect its profits, the damage to the ISP’s reputation could take some time to recover, especially if the government finds its security policies were insufficient in any way. At the very least, the customers who remain loyal should change their passwords and take any other self-service steps to protect their data as quickly as possible.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today