Time Warner Cable Inc has admitted that the passwords of some 320,000 customers subscribing to its cable services may have been compromised.
While we’re still days into the new year, it seemed like it took a while for the first major hack of a corporate database containing everyday consumers’ information to be revealed. Now, major cable provider Time Warner Cable has announced that the login credentials (emails and passwords) of up to 320,000 customers may be compromised.
In a report by Reuters, the cause for the theft of customers’ login details was likely through a phishing attack with a payload containing malware. Alternatively, it could also be the most obvious reason – a data breach targeting a Time Warner server that stores customer details.
In other words, the reason for the leak is unknown. While an outside actor may have breached the cable company’s systems, there were no signs of a breach, yet.
Cable Companies’ Woe
The possibility of a leak surfaced after the company was notified by the FBI of a possible compromise. An FBI-led investigation put the spotlight on customers’ email addresses and passwords found in the wild, a clear indication of the compromise.
As things stand, Time Warner Cable is reaching out to customers to pass on the much-needed advice of changing passwords. A company spokesman revealed that Time Warner is corresponding to customers directly via mail and email to encourage customers to change their passwords.
Time Warner isn’t the only cable company to be targeted by malicious hackers amassing cable customers’ data. The company’s password troubles come not long after it was revealed that a massive trove of personal data that eerily contained email addresses and passwords of hundreds of thousands of Comcast customers was put up for sale on a darknet website. The entire dump was available for $1000.
For its part, Comcast denied a data breach that may have led to the compromise on the company’s end, noting that a leak may have occurred elsewhere. Furthermore, the cable giant obtained a copy of the dump to verify its authenticity and subsequently reset the passwords of some 590,000 accounts to leave no stone unturned.
Featured image from Shutterstock.