iiNet Company Cyber Security Posture

iinet.net.au

iiNet is an Australian Internet Service Provider and a leading challenger in the telecommunications market. We're committed to making it simple for all Australians to get online across both our own ADSL2+ network and the exciting new nbnโ„ข technologies. Our vision is to lead the market with services that harness the potential of the Internet and then differentiate with award-winning customer service. We employ more than 2,500 enthusiastic staff across four countries - 80 per cent of whom are employed to directly service nearly one million customers. iiNet has a proud history of delivering awesome customer service, which has won us dozens of awards, including a silver medal in Customer Service at the 2015 Contact Centre World Best Practice Conference (Asia-Pacific). A lot has changed since iiNet was founded in a suburban garage in 1993 and the broadband landscape continues to evolve. What hasn't changed is our passion for the transformative benefits of the Internet and our commitment to helping Australians connect better.

iiNet Company Details

Linkedin ID:

iinet

Employees number:

888 employees

Number of followers:

17028.0

NAICS:

517

Industry Type:

Telecommunications

Homepage:

iinet.net.au

IP Addresses:

Scan still pending

Company ID:

IIN_2286514

Scan Status:

In-progress

AI scoreiiNet Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

iiNet Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

iiNet Company Cyber Security News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
iiNetBreach100606/2015IIN161522Link
Rankiteo Explanation :
Attack threatening the economy of a geographical region

Description: Internet provider iiNet suffered a data security breach that compromised the passwords of more than 30,000 customers. The anonymous hacker sold the database of Westnet, a WA-based internet service provider that was acquired by iiNet in 2008 on the dark web. The data included customer username, address, telephone, and, in some cases, password information of Aussies biggest Internet service provider.

TPG TelecomData Leak60312/2022TPG2149141222Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Internet services provider TPG Telecom Ltd (TPG.AX), fell victim to a high-profile cyberattack, that compromised the emails of up to 15,000 of its corporate customers. The primary aim of the hack of the hosted exchange service was to search for customers' cryptocurrency and financial information. The company implemented measures to stop unauthorised access and contacted all customers on the exchange service affected by the incident.

iiNet Company Subsidiaries

SubsidiaryImage

iiNet is an Australian Internet Service Provider and a leading challenger in the telecommunications market. We're committed to making it simple for all Australians to get online across both our own ADSL2+ network and the exciting new nbnโ„ข technologies. Our vision is to lead the market with services that harness the potential of the Internet and then differentiate with award-winning customer service. We employ more than 2,500 enthusiastic staff across four countries - 80 per cent of whom are employed to directly service nearly one million customers. iiNet has a proud history of delivering awesome customer service, which has won us dozens of awards, including a silver medal in Customer Service at the 2015 Contact Centre World Best Practice Conference (Asia-Pacific). A lot has changed since iiNet was founded in a suburban garage in 1993 and the broadband landscape continues to evolve. What hasn't changed is our passion for the transformative benefits of the Internet and our commitment to helping Australians connect better.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=iinet' -H 'apikey: YOUR_API_KEY_HERE'
newsone

iiNet Cyber Security News

2024-11-14T01:32:01.000Z
Hackers Sift through 15,000 Exchange Email Accounts Hosted by TGP Telecom Looking for Crypto

Unlike more common attacks aimed at the general collection of personal information, criminals had a very specific goal when they breached TPG Telecom. They wentย ...

2022-12-14T08:00:00.000Z
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hack

Telecommunications company says hacker searched for customers' cryptocurrency and financial information.

2014-06-05T07:00:00.000Z
iiNet goes basic, but future-ready with the Budii Lite modem

iiNet has launched its new Budii Lite modem for those who want a future-proof modem, but don't want or need the Budii handset. Soย ...

2022-12-16T08:00:00.000Z
Hackers Breach TPG Telecomsโ€™ Email Host to Steal Client Data

TPG Telecom claims that the hackers seemed to be searching for the customers' cryptocurrency and financial information.

2022-12-15T08:00:00.000Z
Up to 15,000 email accounts caught up in TPG breach

Another Australian telecommunications giant has suffered a major cyber security incident, as TPG reveals an email hosting service used by up toย ...

2022-12-14T08:00:00.000Z
TPG Telecom discloses hosted Exchange breach at iiNet, Westnet

Threat actors targeted financial data. TPG Telecom has disclosed a breach of hosted Exchange services that run email accounts for up to 15,000ย ...

2022-12-14T08:00:00.000Z
15000 iiNet and Westnet business customers exposed in TPG hack

TPG Telecom's external cyber security adviser Mandiant has uncovered evidence of unauthorised access to a Hosted Exchange service that holdsย ...

2014-10-27T07:00:00.000Z
What Michael Malone did next

SmartCompany is the leading online publication in Australia for free news, information and resources catering to Australia's entrepreneurs,ย ...

2010-09-29T07:00:00.000Z
Attorney-General rings in Cyber Storm III

Attorney General Robert McClelland today launched the four day-long international cybersecurity exercise known as Cyber Storm III inย ...

similarCompanies

iiNet Similar Companies

Mega es una empresa cien por ciento mexicana y lโˆšโ‰ der en el sector de Telecomunicaciones, tenemos 45 aโˆšยฑos de servicio y casi 5 millones de suscriptores a quienes les ofrecemos los servicios de TV, internet, telefonโˆšโ‰ a digital y mโˆšโ‰ฅvil. Estamos en constante crecimiento, hoy en dโˆšโ‰ a tenemos presenci

We are driving the digital transition of Italy and Brazil with innovative technologies and services because we want to contribute to accelerating the sustainable growth of the economy and society by bringing value and prosperity to people, companies and institutions. We offer diversified solutions

airtel

Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

Ooredoo Group

We are an award-winning international communications company operating across the Middle East, North Africa and Southeast Asia. Serving consumers and businesses in 10 countries, we deliver a leading data experience through a broad range of content and services via our advanced, data-centric mob

Altice Group

The Altice Group is a multinational cable, fiber, telecommunications, contents and media company with presence in four regions โ€“ Western Europe (comprising France, Belgium, Luxembourg, Portugal and Switzerland), the United States, Israel and the Overseas Territories (currently comprising the French

KDDI Corporation

We are Japanโ€šร„รดs global telecommunications pioneer and a Global Fortune 500 company providing our international customer base with data centers, networks, content delivery, system integration, and more around the world. If your business needs telecom support internationally, we are here at your serv

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

iiNet CyberSecurity History Information

How many cyber incidents has iiNet faced?

Total Incidents: According to Rankiteo, iiNet has faced 2 incidents in the past.

What types of cybersecurity incidents have occurred at iiNet?

Incident Types: The types of cybersecurity incidents that have occurred incidents Breach and Data Leak.

How does iiNet detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Stopped unauthorised access and communication strategy with Contacted all affected customers.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Cyberattack on TPG Telecom Ltd's Hosted Exchange Service

Description: Internet services provider TPG Telecom Ltd (TPG.AX) fell victim to a high-profile cyberattack that compromised the emails of up to 15,000 of its corporate customers. The primary aim of the hack of the hosted exchange service was to search for customers' cryptocurrency and financial information. The company implemented measures to stop unauthorised access and contacted all customers on the exchange service affected by the incident.

Type: Data Breach

Attack Vector: Email Compromise

Motivation: Financial Gain

Incident : Data Breach

Title: iiNet Data Security Breach

Description: Internet provider iiNet suffered a data security breach that compromised the passwords of more than 30,000 customers. The anonymous hacker sold the database of Westnet, a WA-based internet service provider that was acquired by iiNet in 2008, on the dark web. The data included customer username, address, telephone, and, in some cases, password information of Aussies biggest Internet service provider.

Type: Data Breach

Attack Vector: Dark Web Data Sale

Threat Actor: Anonymous Hacker

Motivation: Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach TPG2149141222

Data Compromised: Cryptocurrency Information, Financial Information

Systems Affected: Hosted Exchange Service

Incident : Data Breach IIN161522

Data Compromised: Customer Username, Address, Telephone, Password Information

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Cryptocurrency Information, Financial Information, Customer Username, Address, Telephone and Password Information.

Which entities were affected by each incident?

Incident : Data Breach TPG2149141222

Entity Type: Internet Services Provider

Industry: Telecommunications

Customers Affected: 15000

Incident : Data Breach IIN161522

Entity Type: Internet Service Provider

Industry: Telecommunications

Location: Australia

Customers Affected: 30,000

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach TPG2149141222

Containment Measures: Stopped unauthorised access

Communication Strategy: Contacted all affected customers

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach TPG2149141222

Type of Data Compromised: Cryptocurrency Information, Financial Information

Number of Records Exposed: 15000

Incident : Data Breach IIN161522

Type of Data Compromised: Customer Username, Address, Telephone, Password Information

Number of Records Exposed: 30,000

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Stopped unauthorised access.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Contacted all affected customers.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach IIN161522

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Anonymous Hacker.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Cryptocurrency Information, Financial Information, Customer Username, Address, Telephone and Password Information.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Hosted Exchange Service.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Stopped unauthorised access.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Cryptocurrency Information, Financial Information, Customer Username, Address, Telephone and Password Information.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 30.1K.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge