Optus Company Cyber Security Posture

optus.com.au

As one of the largest telecommunications companies in Australia, Optus provides mobile, telephony, internet, satellite, entertainment and business network services to more than 10 million customers each day. Our mobile network reaches 98.5 per cent of the Australian population and we are committed to constantly delivering new technologies that will connect more Australians to their friends, families and businesses. We offer a range of pre- and post-paid mobile plans allowing customers to choose a plan that best suits their data and price needs for themselves and their families. Optus is more than just a telco, providing exclusive premium entertainment and sport content across a range of platforms. Whether at youโ€™re at home or on-the-go, you can catch up on the latest TV shows and movies, get closer to the games and players you love with Optus Sport or be the first with tunes on your favourite streaming service and score backstage access to artists with Optus Music. As we move into the next generation, Optus will continue to invest in our people, our communities, our networks and a sustainable future to help create a better and more connected future for Australians.

Optus Company Details

Linkedin ID:

optus

Employees number:

10667 employees

Number of followers:

162707.0

NAICS:

517

Industry Type:

Telecommunications

Homepage:

optus.com.au

IP Addresses:

Scan still pending

Company ID:

OPT_5082403

Scan Status:

In-progress

AI scoreOptus Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Optus Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Optus Company Cyber Security News & History

Past Incidents
6
Attack Types
3
EntityTypeSeverityImpactSeenUrl IDDetailsView
SingtelBreach80402/2021SIN18512322Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The personal identification information of about 129,000 customers of Singtel was breached in a cyber attack on data transfer software, Accellionโ€™s FTA that it uses. The stolen data includes name, date of birth, phone number, and address of the customers along with bank account information of some former employees.

OptusBreach85411/2022OPT2318111122Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Dennis Su, 19, texted 93 of the telco's customers, demanding they transfer $2000 to a CBA bank account He threatened them for exposing personal information being used for financial crimes. He was having a difficult time being unemployed and wanted to make some quick money.

OptusBreach8547/2025OPT748072825Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Optus breach in 2022 involved attackers stealing millions of customer records through an unauthenticated API endpoint. This incident cost the telecom company $140 million AUD in fallout. The vulnerability was easy to exploit and similar issues are still being found in major organizations.

OptusBreach10058/2025OPT448080825Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The Australian Information Commissioner (AIC) has launched civil action against Optus for a 2022 data breach that exposed the personal details of 9.5 million Australians. The breach involved sensitive personally identifiable information, including names, dates of birth, home addresses, phone numbers, email addresses, and government-related identifiers such as passport numbers, driverโ€™s licence numbers, and Medicare card numbers. The attackers exploited a misconfigured API to access the dataset without authentication and issued a ransom demand. Although Optus prevented the theft of payment details and account passwords, a portion of the stolen data was leaked online. The AIC alleges Optus failed to take reasonable steps to protect the data, potentially facing significant financial penalties.

OptusCyber Attack100609/2022OPT2353111122Link
Rankiteo Explanation :
Attack threatening the economy of a geographical region

Description: Hackers have breached Optusโ€™ systems. They accessed names, dates of birth, phone numbers, email addresses, physical addresses and driverโ€™s licence numbers of millions of the telecommunications giantโ€™s customers. Up to 9 million customers had been affected. Many had their contact details exposed to the hackers, who also pilfered even more sensitive details, such as passport and driversโ€™ licence numbers, for a smaller portion of Optus customers.

OptusRansomware100609/2022OPT222127922Link
Rankiteo Explanation :
Attack threatening the economy of a geographical region

Description: Optus, a telecommunications company suffered a data breach that exposed the private information of 10,000 account holders. The hackers, OptusData, demanded a ransom payment of about AUD$1.5 million in Monero cryptocurrency and said 10,000 records would be released daily until the cash is paid. According to the ransom note, more than 3.8 million "identity document numbers", 3.2 million driver's license numbers and four million user data records were exposed in the breach.

Optus Company Subsidiaries

SubsidiaryImage

As one of the largest telecommunications companies in Australia, Optus provides mobile, telephony, internet, satellite, entertainment and business network services to more than 10 million customers each day. Our mobile network reaches 98.5 per cent of the Australian population and we are committed to constantly delivering new technologies that will connect more Australians to their friends, families and businesses. We offer a range of pre- and post-paid mobile plans allowing customers to choose a plan that best suits their data and price needs for themselves and their families. Optus is more than just a telco, providing exclusive premium entertainment and sport content across a range of platforms. Whether at youโ€™re at home or on-the-go, you can catch up on the latest TV shows and movies, get closer to the games and players you love with Optus Sport or be the first with tunes on your favourite streaming service and score backstage access to artists with Optus Music. As we move into the next generation, Optus will continue to invest in our people, our communities, our networks and a sustainable future to help create a better and more connected future for Australians.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=optus' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Optus Cyber Security News

2025-08-08T01:36:19.000Z
Regulatory Risk in the Telecom Sector: Lessons from Optus' 2022 Data Breach and Its Impact on Investor Strategy

Optus' 2022 data breach exposing 10M Australians' personal info triggered telecom sector regulatory reforms and investor scrutiny overย ...

2025-08-08T01:19:00.000Z
Australia's privacy regulator sues Optus over 2022 data breach

An Australian regulator has sued Optus, alleging the Singapore Telecommunications-owned carrier breached privacy laws during a 2022 cyberย ...

2025-08-08T00:57:00.000Z
Optus sued over massive data breach

Optus is being sued over the 2022 data breach that exposed the personal data of 9.5 million people.

2025-08-08T01:00:03.000Z
The Optus Data Breach and the New Era of Cybersecurity Accountability in Telecom

- Optus 2022 data breach exposed 10M Australians' data, triggering regulatory reforms and legal actions. - Telecoms now face stricterย ...

2025-08-08T02:01:00.000Z
OAIC sues Optus for alleged failings in lead up to 2022 data breach

The context: On 22 September 2022, Optus announced it had been hit by a data breach that is estimated to have affected nearly 10 million people.

2025-08-08T01:14:32.000Z
Optus sued over massive data breach

Optus is being sued for allegedly failing to protect the data of 9.5 million people. The Australian Information Commissioner announced on Fridayย ...

2025-08-08T01:40:00.000Z
Optus to answer privacy court case stemming from 2022 data breach

Fresh action filed against telco. Optus is set to face a privacy lawsuit stemming from its 2022 data breach, with Federal Court proceedingsย ...

2025-04-13T07:00:00.000Z
Legal professional privilege in cybersecurity incident reports โ€“ mere โ€˜incantationsโ€™ are not sufficient

The legal purpose must be the dominant purpose for which a document or report comes into existence or a communication is made in order for legalย ...

2022-09-27T07:00:00.000Z
Australiaโ€™s telecom giant Optus avoids ransom demand as attacker reverses course

The attack on Optus was an โ€œunprecedented theft of consumer information in Australian history,โ€ Clare O'Neil, minister for home affairs andย ...

similarCompanies

Optus Similar Companies

Rogers Communications

Rogers is Canadaโ€™s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Dรฉterminรฉe ร  connecter et ร  divertir les Canadiens et Canadiennes, Rogers est la rรฉfรฉrence canadienne en matiรจre de commu

Fundada em 1975, a Telemont Engenharia de TelecomunicaโˆšรŸโˆšยตes S/A โˆšยฉ lโˆšโ‰ der na prestaโˆšรŸโˆšยฃo de serviโˆšรŸos de implantaโˆšรŸโˆšยฃo, manutenโˆšรŸโˆšยฃo e operaโˆšรŸโˆšยฃo de redes de telecomunicaโˆšรŸโˆšยตes. Sโˆšยฃo 7,7 milhโˆšยตes de acessos de voz, 3 milhโˆšยตes de ADSL e dados e 63 mil km de fibra โˆšโ‰ฅptica operados pela empresa. At

Tata Communications

Tata Communications is a digital ecosystem enabler that powers todayโ€™s fast-growing digital economy. We enable the digital transformation of enterprises globally, including 300 of the Fortune 500. We carry around 30% of the worldโ€™s internet routes and connects businesses to 60% of the worldโ€™s cloud

Telecom Egypt

Since its establishment in 1854, Telecom Egypt has played a pivotal role in driving growth within the local ICT market capitalizing on its vast infrastructure, which is one of the largest in the region. Its vast domestic and international infrastructure has helped it serve various customer groups in

Globe Telecom

Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed,

ZTE Corporation

ZTE Corporation is a global leading provider of integrated information and communication technology solutions. Founded in 1985 and listed on both the Hong Kong and Shenzhen Stock Exchanges, the company has been committed to providing innovative technologies and integrated solutions for global operat

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Optus CyberSecurity History Information

How many cyber incidents has Optus faced?

Total Incidents: According to Rankiteo, Optus has faced 6 incidents in the past.

What types of cybersecurity incidents have occurred at Optus?

Incident Types: The types of cybersecurity incidents that have occurred incidents Ransomware, Cyber Attack and Breach.

What was the total financial impact of these incidents on Optus?

Total Financial Loss: The total financial loss from these incidents is estimated to be $140 million.

How does Optus detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through incident response plan activated with True and communication strategy with Public apology and statement.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Optus Data Breach

Description: The Australian Information Commissioner (AIC) has launched civil action against Optus for a 2022 data breach that exposed the personal details of 9.5 million Australians. The lawsuit alleges that Optus failed to take reasonable steps to protect victimsโ€™ personal information from unauthorized access and disclosure, in breach of Australiaโ€™s Privacy Act 1988.

Date Detected: 2022-09

Date Publicly Disclosed: 2022-09

Type: Data Breach

Attack Vector: Misconfigured API

Vulnerability Exploited: Misconfigured API

Motivation: Financial gain (ransom demand)

Incident : Data Breach

Title: APIs: Still Easy Targets in 2025

Description: APIs are the backbone of modern applications and one of the most exposed parts of an organizationโ€™s infrastructure, making them a prime target for attackers. One of the highest-profile examples was the Optus breach in 2022, where attackers stole millions of customer records through an unauthenticated API endpoint, costing the telecom company $140 million AUD in fallout.

Type: Data Breach

Attack Vector: Unauthenticated API Endpoint

Vulnerability Exploited: Broken Authorization

Incident : Data Breach

Title: Data Breach at Optus

Description: Hackers have breached Optusโ€™ systems, accessing personal information of millions of customers.

Type: Data Breach

Threat Actor: Hackers

Incident : Extortion

Title: Extortion Attempt by Unemployed Individual

Description: Dennis Su, 19, texted 93 of the telco's customers, demanding they transfer $2000 to a CBA bank account. He threatened them for exposing personal information being used for financial crimes. He was having a difficult time being unemployed and wanted to make some quick money.

Type: Extortion

Attack Vector: SMS

Threat Actor: Dennis Su

Motivation: Financial Gain

Incident : Data Breach, Ransomware

Title: Optus Data Breach

Description: Optus, a telecommunications company, suffered a data breach that exposed the private information of 10,000 account holders. The hackers, OptusData, demanded a ransom payment of about AUD$1.5 million in Monero cryptocurrency and said 10,000 records would be released daily until the cash is paid. According to the ransom note, more than 3.8 million "identity document numbers", 3.2 million driver's license numbers and four million user data records were exposed in the breach.

Type: Data Breach, Ransomware

Threat Actor: OptusData

Motivation: Financial

Incident : Data Breach

Title: Singtel Data Breach

Description: The personal identification information of about 129,000 customers of Singtel was breached in a cyber attack on data transfer software, Accellionโ€™s FTA that it uses. The stolen data includes name, date of birth, phone number, and address of the customers along with bank account information of some former employees.

Type: Data Breach

Attack Vector: Vulnerability in third-party software (Accellionโ€™s FTA)

Vulnerability Exploited: Accellionโ€™s FTA

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Misconfigured API and Unauthenticated API Endpoint.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach OPT448080825

Data Compromised: Personal details of 9.5 million Australians

Brand Reputation Impact: Significant

Legal Liabilities: Potential civil penalty order

Identity Theft Risk: High

Payment Information Risk: None (payment details and account passwords were not stolen)

Incident : Data Breach OPT748072825

Financial Loss: 140 million AUD

Data Compromised: Millions of customer records

Incident : Data Breach OPT2353111122

Data Compromised: names, dates of birth, phone numbers, email addresses, physical addresses, driverโ€™s licence numbers, passport numbers

Incident : Data Breach, Ransomware OPT222127922

Data Compromised: Identity document numbers, Driver's license numbers, User data records

Incident : Data Breach SIN18512322

Data Compromised: Name, Date of Birth, Phone Number, Address, Bank Account Information

Systems Affected: Accellionโ€™s FTA

What is the average financial loss per incident?

Average Financial Loss: The average financial loss per incident is $23.33 million.

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally identifiable information, Customer records, names, dates of birth, phone numbers, email addresses, physical addresses, driverโ€™s licence numbers, passport numbers, Identity document numbers, Driver's license numbers, User data records, Personal Identification Information and Bank Account Information.

Which entities were affected by each incident?

Incident : Data Breach OPT448080825

Entity Type: Telecommunications

Industry: Telecommunications

Location: Australia

Size: Large

Customers Affected: 9.5 million

Incident : Data Breach OPT748072825

Entity Type: Telecom Company

Industry: Telecommunications

Customers Affected: Millions

Incident : Data Breach OPT2353111122

Entity Type: Telecommunications Company

Industry: Telecommunications

Customers Affected: Up to 9 million

Incident : Extortion OPT2318111122

Entity Type: Telco

Industry: Telecommunications

Customers Affected: 93

Incident : Data Breach, Ransomware OPT222127922

Entity Type: Telecommunications Company

Industry: Telecommunications

Customers Affected: 10000

Incident : Data Breach SIN18512322

Entity Type: Telecommunications Company

Industry: Telecommunications

Customers Affected: 129,000

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach OPT448080825

Incident Response Plan Activated: True

Communication Strategy: Public apology and statement

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach OPT448080825

Type of Data Compromised: Personally identifiable information

Number of Records Exposed: 9.5 million

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: Names, dates of birth, home addresses, phone numbers, email addresses, government-related identifiers (passport numbers, driverโ€™s licence numbers, Medicare card numbers, birth certificate information, marriage certificate information, armed forces, defence force and police identification information)

Incident : Data Breach OPT748072825

Type of Data Compromised: Customer records

Number of Records Exposed: Millions

Incident : Data Breach OPT2353111122

Type of Data Compromised: names, dates of birth, phone numbers, email addresses, physical addresses, driverโ€™s licence numbers, passport numbers

Number of Records Exposed: Up to 9 million

Personally Identifiable Information: True

Incident : Data Breach, Ransomware OPT222127922

Type of Data Compromised: Identity document numbers, Driver's license numbers, User data records

Number of Records Exposed: 11000000

Incident : Data Breach SIN18512322

Type of Data Compromised: Personal Identification Information, Bank Account Information

Number of Records Exposed: 129,000

Personally Identifiable Information: Name, Date of Birth, Phone Number, Address

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Data Breach OPT448080825

Ransom Demanded: True

Data Exfiltration: True

Incident : Extortion OPT2318111122

Ransom Demanded: $2000

Incident : Data Breach, Ransomware OPT222127922

Ransom Demanded: AUD$1.5 million

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident?

Incident : Data Breach OPT448080825

Regulations Violated: Australiaโ€™s Privacy Act 1988

Legal Actions: Civil penalty order sought by AIC

How does the company ensure compliance with regulatory requirements?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Civil penalty order sought by AIC.

Lessons Learned and Recommendations

What lessons were learned from each incident?

Incident : Data Breach OPT448080825

Lessons Learned: Organizations holding personal information need to ensure they have strong data governance and security practices to guard against vulnerabilities that threat actors will be ready to exploit.

What are the key lessons learned from past incidents?

Key Lessons Learned: The key lessons learned from past incidents are Organizations holding personal information need to ensure they have strong data governance and security practices to guard against vulnerabilities that threat actors will be ready to exploit.

References

Where can I find more information about each incident?

Incident : Data Breach OPT448080825

Source: Australian Information Commissioner

Date Accessed: 2024-08-08

Incident : Data Breach OPT748072825

Source: Intruder

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Australian Information CommissionerDate Accessed: 2024-08-08, and Source: Intruder.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Data Breach OPT448080825

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Public apology and statement.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Data Breach OPT448080825

Customer Advisories: Public apology and statement

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Public apology and statement.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach OPT448080825

Entry Point: Misconfigured API

Incident : Data Breach OPT748072825

Entry Point: Unauthenticated API Endpoint

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Data Breach OPT448080825

Root Causes: Misconfigured API and inadequate security practices

Corrective Actions: Investing in the security of customersโ€™ information, systems, and cyber defence capabilities

Incident : Data Breach OPT748072825

Root Causes: Broken Authorization

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Investing in the security of customersโ€™ information, systems, and cyber defence capabilities.

Additional Questions

General Information

What was the amount of the last ransom demanded?

Last Ransom Demanded: The amount of the last ransom demanded was True.

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Hackers, Dennis Su and OptusData.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2022-09.

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2022-09.

Impact of the Incidents

What was the highest financial loss from an incident?

Highest Financial Loss: The highest financial loss from an incident was 140 million AUD.

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Personal details of 9.5 million Australians, Millions of customer records, names, dates of birth, phone numbers, email addresses, physical addresses, driverโ€™s licence numbers, passport numbers, Identity document numbers, Driver's license numbers, User data records, Name, Date of Birth, Phone Number, Address and Bank Account Information.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Accellionโ€™s FTA.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal details of 9.5 million Australians, Millions of customer records, names, dates of birth, phone numbers, email addresses, physical addresses, driverโ€™s licence numbers, passport numbers, Identity document numbers, Driver's license numbers, User data records, Name, Date of Birth, Phone Number, Address and Bank Account Information.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 18.6M.

Ransomware Information

What was the highest ransom demanded in a ransomware incident?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $2000.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Civil penalty order sought by AIC.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Organizations holding personal information need to ensure they have strong data governance and security practices to guard against vulnerabilities that threat actors will be ready to exploit.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident are Australian Information Commissioner and Intruder.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was was an Public apology and statement.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Unauthenticated API Endpoint and Misconfigured API.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Misconfigured API and inadequate security practices, Broken Authorization.

What was the most significant corrective action taken based on post-incident analysis?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Investing in the security of customersโ€™ information, systems, and cyber defence capabilities.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge