
iiNet Company Cyber Security Posture
iinet.net.auiiNet is an Australian Internet Service Provider and a leading challenger in the telecommunications market. We're committed to making it simple for all Australians to get online across both our own ADSL2+ network and the exciting new nbnโข technologies. Our vision is to lead the market with services that harness the potential of the Internet and then differentiate with award-winning customer service. We employ more than 2,500 enthusiastic staff across four countries - 80 per cent of whom are employed to directly service nearly one million customers. iiNet has a proud history of delivering awesome customer service, which has won us dozens of awards, including a silver medal in Customer Service at the 2015 Contact Centre World Best Practice Conference (Asia-Pacific). A lot has changed since iiNet was founded in a suburban garage in 1993 and the broadband landscape continues to evolve. What hasn't changed is our passion for the transformative benefits of the Internet and our commitment to helping Australians connect better.
iiNet Company Details
iinet
888 employees
17028.0
517
Telecommunications
iinet.net.au
Scan still pending
IIN_2286514
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

iiNet Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
iiNet Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
iiNet | Breach | 100 | 6 | 06/2015 | IIN161522 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: Internet provider iiNet suffered a data security breach that compromised the passwords of more than 30,000 customers. The anonymous hacker sold the database of Westnet, a WA-based internet service provider that was acquired by iiNet in 2008 on the dark web. The data included customer username, address, telephone, and, in some cases, password information of Aussies biggest Internet service provider. | |||||||
TPG Telecom | Data Leak | 60 | 3 | 12/2022 | TPG2149141222 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: Internet services provider TPG Telecom Ltd (TPG.AX), fell victim to a high-profile cyberattack, that compromised the emails of up to 15,000 of its corporate customers. The primary aim of the hack of the hosted exchange service was to search for customers' cryptocurrency and financial information. The company implemented measures to stop unauthorised access and contacted all customers on the exchange service affected by the incident. |
iiNet Company Subsidiaries

iiNet is an Australian Internet Service Provider and a leading challenger in the telecommunications market. We're committed to making it simple for all Australians to get online across both our own ADSL2+ network and the exciting new nbnโข technologies. Our vision is to lead the market with services that harness the potential of the Internet and then differentiate with award-winning customer service. We employ more than 2,500 enthusiastic staff across four countries - 80 per cent of whom are employed to directly service nearly one million customers. iiNet has a proud history of delivering awesome customer service, which has won us dozens of awards, including a silver medal in Customer Service at the 2015 Contact Centre World Best Practice Conference (Asia-Pacific). A lot has changed since iiNet was founded in a suburban garage in 1993 and the broadband landscape continues to evolve. What hasn't changed is our passion for the transformative benefits of the Internet and our commitment to helping Australians connect better.
Access Data Using Our API

Get company history
.png)
iiNet Cyber Security News
Hackers Sift through 15,000 Exchange Email Accounts Hosted by TGP Telecom Looking for Crypto
Unlike more common attacks aimed at the general collection of personal information, criminals had a very specific goal when they breached TPG Telecom. They wentย ...
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hack
Telecommunications company says hacker searched for customers' cryptocurrency and financial information.
iiNet goes basic, but future-ready with the Budii Lite modem
iiNet has launched its new Budii Lite modem for those who want a future-proof modem, but don't want or need the Budii handset. Soย ...
Hackers Breach TPG Telecomsโ Email Host to Steal Client Data
TPG Telecom claims that the hackers seemed to be searching for the customers' cryptocurrency and financial information.
Up to 15,000 email accounts caught up in TPG breach
Another Australian telecommunications giant has suffered a major cyber security incident, as TPG reveals an email hosting service used by up toย ...
TPG Telecom discloses hosted Exchange breach at iiNet, Westnet
Threat actors targeted financial data. TPG Telecom has disclosed a breach of hosted Exchange services that run email accounts for up to 15,000ย ...
15000 iiNet and Westnet business customers exposed in TPG hack
TPG Telecom's external cyber security adviser Mandiant has uncovered evidence of unauthorised access to a Hosted Exchange service that holdsย ...
What Michael Malone did next
SmartCompany is the leading online publication in Australia for free news, information and resources catering to Australia's entrepreneurs,ย ...
Attorney-General rings in Cyber Storm III
Attorney General Robert McClelland today launched the four day-long international cybersecurity exercise known as Cyber Storm III inย ...

iiNet Similar Companies

MEGACABLE
Mega es una empresa cien por ciento mexicana y lโโ der en el sector de Telecomunicaciones, tenemos 45 aโยฑos de servicio y casi 5 millones de suscriptores a quienes les ofrecemos los servicios de TV, internet, telefonโโ a digital y mโโฅvil. Estamos en constante crecimiento, hoy en dโโ a tenemos presenci

TIM
We are driving the digital transition of Italy and Brazil with innovative technologies and services because we want to contribute to accelerating the sustainable growth of the economy and society by bringing value and prosperity to people, companies and institutions. We offer diversified solutions

airtel
Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

Ooredoo Group
We are an award-winning international communications company operating across the Middle East, North Africa and Southeast Asia. Serving consumers and businesses in 10 countries, we deliver a leading data experience through a broad range of content and services via our advanced, data-centric mob

Altice Group
The Altice Group is a multinational cable, fiber, telecommunications, contents and media company with presence in four regions โ Western Europe (comprising France, Belgium, Luxembourg, Portugal and Switzerland), the United States, Israel and the Overseas Territories (currently comprising the French

KDDI Corporation
We are Japanโรรดs global telecommunications pioneer and a Global Fortune 500 company providing our international customer base with data centers, networks, content delivery, system integration, and more around the world. If your business needs telecom support internationally, we are here at your serv

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
iiNet CyberSecurity History Information
How many cyber incidents has iiNet faced?
Total Incidents: According to Rankiteo, iiNet has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at iiNet?
Incident Types: The types of cybersecurity incidents that have occurred incidents Breach and Data Leak.
How does iiNet detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Stopped unauthorised access and communication strategy with Contacted all affected customers.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Cyberattack on TPG Telecom Ltd's Hosted Exchange Service
Description: Internet services provider TPG Telecom Ltd (TPG.AX) fell victim to a high-profile cyberattack that compromised the emails of up to 15,000 of its corporate customers. The primary aim of the hack of the hosted exchange service was to search for customers' cryptocurrency and financial information. The company implemented measures to stop unauthorised access and contacted all customers on the exchange service affected by the incident.
Type: Data Breach
Attack Vector: Email Compromise
Motivation: Financial Gain

Incident : Data Breach
Title: iiNet Data Security Breach
Description: Internet provider iiNet suffered a data security breach that compromised the passwords of more than 30,000 customers. The anonymous hacker sold the database of Westnet, a WA-based internet service provider that was acquired by iiNet in 2008, on the dark web. The data included customer username, address, telephone, and, in some cases, password information of Aussies biggest Internet service provider.
Type: Data Breach
Attack Vector: Dark Web Data Sale
Threat Actor: Anonymous Hacker
Motivation: Financial Gain
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach TPG2149141222
Data Compromised: Cryptocurrency Information, Financial Information
Systems Affected: Hosted Exchange Service

Incident : Data Breach IIN161522
Data Compromised: Customer Username, Address, Telephone, Password Information
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Cryptocurrency Information, Financial Information, Customer Username, Address, Telephone and Password Information.
Which entities were affected by each incident?

Incident : Data Breach TPG2149141222
Entity Type: Internet Services Provider
Industry: Telecommunications
Customers Affected: 15000

Incident : Data Breach IIN161522
Entity Type: Internet Service Provider
Industry: Telecommunications
Location: Australia
Customers Affected: 30,000
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach TPG2149141222
Containment Measures: Stopped unauthorised access
Communication Strategy: Contacted all affected customers
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach TPG2149141222
Type of Data Compromised: Cryptocurrency Information, Financial Information
Number of Records Exposed: 15000

Incident : Data Breach IIN161522
Type of Data Compromised: Customer Username, Address, Telephone, Password Information
Number of Records Exposed: 30,000
Sensitivity of Data: High
Data Exfiltration: True
Personally Identifiable Information: True
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Stopped unauthorised access.
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Contacted all affected customers.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach IIN161522
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Anonymous Hacker.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Cryptocurrency Information, Financial Information, Customer Username, Address, Telephone and Password Information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Hosted Exchange Service.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Stopped unauthorised access.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Cryptocurrency Information, Financial Information, Customer Username, Address, Telephone and Password Information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 30.1K.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
