Company Details
telstra
35,264
403,314
517
telstra.com.au
0
TEL_3122641
In-progress

Telstra Company CyberSecurity Posture
telstra.com.auWe believe it’s people who give purpose to our technology. So we’re committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build technology and content solutions that are simple and easy to use, including Australia’s largest and fastest national mobile network. That’s why we strive to serve and know our customers better than anyone else – offering a choice of not just digital connection, but digital content as well. And that’s why we have an international presence spanning 15 countries, including China. In the 21st century, opportunity belongs to connected businesses, governments, communities and individuals. As Australia’s leading telecommunications and information services company, Telstra is proud to be helping our customers improve the ways in which they live and work through connection. Be first to know about Telstra news, advice and offers, as well as updates on our people and partners: tel.st/subscribe
Company Details
telstra
35,264
403,314
517
telstra.com.au
0
TEL_3122641
In-progress
Between 750 and 799

Telstra Global Score (TPRM)XXXX

Description: A 63-year-old layman was been able to access a Telstra database containing the contact details of their customers. Once he signed in, he put in the search term “email” and it returned 66,500 results containing names, addresses, email addresses and phone numbers. Telstra has also since identified two other customers who were able to access the database.
Description: Australia's largest telecoms firm Telstra Corp Ltd suffered a data breach incident which affected around 30,000 current and former employees. The breach compromised basic information like names and email addresses.
Description: TELSTRA faced another data privacy breach incident after the email addresses and phone numbers of more than a thousand of its BigPond customers were made accessible online. An online spreadsheet containing customer names, email addresses and details of service support issues, was exposed.
Description: Australian telecom firm Telstra was hit by a cyber attack result of which the hackers gained access to 10000 SIM cards. The compromised information included financial information, contracts, and banking information of the SIM card users. The company’s website has been offline for days after a hacker group said it infiltrated the company’s data systems and posted a disturbing ransom note on the dark web.
Description: A flaw in medical software used by more than 40,000 Australian health specialists and distributed by Telstra has potentially exposed Australians' medical information to hackers. Hackers have been logging into practitioners' computers and servers to carry out illegal activities. The flaw in the "secure" messaging software is specifically leaving computers with remote desktop software installed wide open because it creates a separate username with a static default password that will allow for an easy intrusion.


No incidents recorded for Telstra in 2025.
No incidents recorded for Telstra in 2025.
No incidents recorded for Telstra in 2025.
Telstra cyber incidents detection timeline including parent company and subsidiaries

We believe it’s people who give purpose to our technology. So we’re committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build technology and content solutions that are simple and easy to use, including Australia’s largest and fastest national mobile network. That’s why we strive to serve and know our customers better than anyone else – offering a choice of not just digital connection, but digital content as well. And that’s why we have an international presence spanning 15 countries, including China. In the 21st century, opportunity belongs to connected businesses, governments, communities and individuals. As Australia’s leading telecommunications and information services company, Telstra is proud to be helping our customers improve the ways in which they live and work through connection. Be first to know about Telstra news, advice and offers, as well as updates on our people and partners: tel.st/subscribe


Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

Telkom Business is the business unit dedicated to serving businesses of every type, industry and size in and outside South Africa. The businesses that we serve range from small and medium enterprises (SMEs) to large corporations, government organisations and global enterprises. A sub-brand of the

Since its establishment in 1854, Telecom Egypt has played a pivotal role in driving growth within the local ICT market capitalizing on its vast infrastructure, which is one of the largest in the region. Its vast domestic and international infrastructure has helped it serve various customer groups in

Bharti Enterprises is one of India’s leading business group with diversified interests in telecom, financial services, real estate, hospitality, agri and food. Bharti has been a pioneering force in the Indian telecom sector with many firsts and innovations to its credit. Bharti Airtel, the group's

Vodafone Idea Limited is an Aditya Birla Group and Vodafone Group partnership. It is India’s leading telecom service provider. The Company provides pan India Voice and Data services across 2G, 3G and 4G platform. With the large spectrum portfolio to support the growing demand for data and voice, the

EMPOWERING SOCIETIES. CONNECTING YOU TO WHAT MATTERS MOST. Telenor Group is a leading telecommunications company across the Nordics and Asia with 158 million subscribers and annual sales of around NOK 99 billions (2022). We are committed to responsible business conduct and driven by the ambition

Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu
🤝Ce qui fait notre singularité ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualité de nos relations avec notre famille, nos amis, ceux qui nous entourent est déterminante pour notre bien-être, notre santé et même notre espérance de vie. Ce sont ces rela
Make a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the future to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make I
.png)
Telstra has denied being breached by hackers after a notorious criminal group added it to the list of companies exposed in a wide-ranging...
The Telstra Data Breach involves claims of 100GB of stolen data by Scattered Spider. Telstra denies system breach as ransom deadline...
The ad features Buscemi as an intergalactic Emperor attempting to take over Australia with hi-tech scams, but his schemes are foiled as his crew...
Key Facts: Accelerating AI-powered Cloud & Digital transformation for Australian enterprisesBengaluru, India and Melbourne,...
Ad of the Day: Steve Buscemi as evil scamming emperor in Telstra cybersecurity ad. Australian telecoms brand proves its anti-scamming...
Settings ... Telstra has tapped Steve Buscemi (yes, really) to star in its latest spot showing off the power of its network security created by...
Steve Buscemi's bulbous-brained galactic emperor barks orders. But his malevolent minions can't reckon with the cybersecurity prowess of...
Off the back of its Cannes Grand Prix win, Telstra has seemingly splashed out the big bucks for a new campaign starring Hollywood actor...
Telstra helps protect millions of Australians daily by blocking scam calls, fake messages & dangerous websites before they reach your device.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Telstra is https://www.telstra.com.au/careers.
According to Rankiteo, Telstra’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Telstra currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Telstra is not certified under SOC 2 Type 1.
According to Rankiteo, Telstra does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Telstra is not listed as GDPR compliant.
According to Rankiteo, Telstra does not currently maintain PCI DSS compliance.
According to Rankiteo, Telstra is not compliant with HIPAA regulations.
According to Rankiteo,Telstra is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Telstra operates primarily in the Telecommunications industry.
Telstra employs approximately 35,264 people worldwide.
Telstra presently has no subsidiaries across any sectors.
Telstra’s official LinkedIn profile has approximately 403,314 followers.
Telstra is classified under the NAICS code 517, which corresponds to Telecommunications.
Yes, Telstra has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/telstra.
Yes, Telstra maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telstra.
As of December 11, 2025, Rankiteo reports that Telstra has experienced 5 cybersecurity incidents.
Telstra has an estimated 9,686 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability, Data Leak and Breach.
Title: Medical Software Flaw Exposes Australians' Medical Information
Description: A flaw in medical software used by more than 40,000 Australian health specialists and distributed by Telstra has potentially exposed Australians' medical information to hackers. Hackers have been logging into practitioners' computers and servers to carry out illegal activities. The flaw in the 'secure' messaging software is specifically leaving computers with remote desktop software installed wide open because it creates a separate username with a static default password that will allow for an easy intrusion.
Type: Data Breach
Attack Vector: Exploitation of Default Credentials
Vulnerability Exploited: Static default password in remote desktop software
Threat Actor: Hackers
Motivation: Illegal activities
Title: Telstra Data Breach
Description: Australia's largest telecoms firm Telstra Corp Ltd suffered a data breach incident which affected around 30,000 current and former employees. The breach compromised basic information like names and email addresses.
Type: Data Breach
Title: Telstra Database Breach
Description: A 63-year-old layman was able to access a Telstra database containing the contact details of their customers. Once he signed in, he put in the search term 'email' and it returned 66,500 results containing names, addresses, email addresses, and phone numbers. Telstra has also since identified two other customers who were able to access the database.
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Layman
Title: Telstra BigPond Customer Data Breach
Description: Telstra faced a data privacy breach incident where the email addresses and phone numbers of more than a thousand of its BigPond customers were made accessible online. An online spreadsheet containing customer names, email addresses, and details of service support issues was exposed.
Type: Data Breach
Title: Telstra Cyber Attack
Description: Australian telecom firm Telstra was hit by a cyber attack resulting in hackers gaining access to 10000 SIM cards. The compromised information included financial information, contracts, and banking information of the SIM card users. The company’s website has been offline for days after a hacker group said it infiltrated the company’s data systems and posted a disturbing ransom note on the dark web.
Type: Data Breach
Attack Vector: Unspecified
Threat Actor: Hacker Group
Motivation: Ransom
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Remote desktop software.

Data Compromised: Medical information
Systems Affected: Computers with remote desktop software

Data Compromised: Names, Email addresses

Data Compromised: Names, Addresses, Email addresses, Phone numbers
Systems Affected: Telstra Database

Data Compromised: Email addresses, Phone numbers, Customer names, Details of service support issues

Data Compromised: Financial information, Contracts, Banking information
Systems Affected: website
Downtime: days
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Medical information, Names, Email Addresses, , Personal Information, , Email Addresses, Phone Numbers, Customer Names, Details Of Service Support Issues, , Financial Information, Contracts, Banking Information and .

Entity Name: Telstra
Entity Type: Company
Industry: Telecommunications
Location: Australia
Customers Affected: More than 40,000 Australian health specialists

Entity Name: Telstra Corp Ltd
Entity Type: Telecoms Firm
Industry: Telecommunications
Location: Australia
Customers Affected: 30,000 current and former employees

Entity Name: Telstra
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: 66500

Entity Name: Telstra
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: More than a thousand BigPond customers

Entity Name: Telstra
Entity Type: Telecom Firm
Industry: Telecommunications
Location: Australia
Customers Affected: 10000

Type of Data Compromised: Medical information
Sensitivity of Data: High

Type of Data Compromised: Names, Email addresses
Number of Records Exposed: 30,000

Type of Data Compromised: Personal information
Number of Records Exposed: 66500

Type of Data Compromised: Email addresses, Phone numbers, Customer names, Details of service support issues
Number of Records Exposed: More than a thousand

Type of Data Compromised: Financial information, Contracts, Banking information
Number of Records Exposed: 10000

Entry Point: Remote desktop software

Root Causes: Static default password in remote desktop software
Last Attacking Group: The attacking group in the last incident were an Hackers, Layman and Hacker Group.
Most Significant Data Compromised: The most significant data compromised in an incident were Medical information, names, email addresses, , Names, Addresses, Email Addresses, Phone Numbers, , email addresses, phone numbers, customer names, details of service support issues, , financial information, contracts, banking information and .
Most Significant System Affected: The most significant system affected in an incident was Telstra Database and website.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Medical information, names, Addresses, details of service support issues, financial information, Names, banking information, contracts, Phone Numbers, Email Addresses, email addresses, customer names and phone numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 30.8K.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Remote desktop software.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.