
Optus Company Cyber Security Posture
optus.com.auAs one of the largest telecommunications companies in Australia, Optus provides mobile, telephony, internet, satellite, entertainment and business network services to more than 10 million customers each day. Our mobile network reaches 98.5 per cent of the Australian population and we are committed to constantly delivering new technologies that will connect more Australians to their friends, families and businesses. We offer a range of pre- and post-paid mobile plans allowing customers to choose a plan that best suits their data and price needs for themselves and their families. Optus is more than just a telco, providing exclusive premium entertainment and sport content across a range of platforms. Whether at youโre at home or on-the-go, you can catch up on the latest TV shows and movies, get closer to the games and players you love with Optus Sport or be the first with tunes on your favourite streaming service and score backstage access to artists with Optus Music. As we move into the next generation, Optus will continue to invest in our people, our communities, our networks and a sustainable future to help create a better and more connected future for Australians.
Optus Company Details
optus
10632 employees
157794.0
517
Telecommunications
optus.com.au
Scan still pending
OPT_5082403
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Optus Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Optus Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Singtel | Breach | 80 | 4 | 02/2021 | SIN18512322 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The personal identification information of about 129,000 customers of Singtel was breached in a cyber attack on data transfer software, Accellionโs FTA that it uses. The stolen data includes name, date of birth, phone number, and address of the customers along with bank account information of some former employees. | |||||||
Optus | Ransomware | 100 | 6 | 09/2022 | OPT222127922 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: Optus, a telecommunications company suffered a data breach that exposed the private information of 10,000 account holders. The hackers, OptusData, demanded a ransom payment of about AUD$1.5 million in Monero cryptocurrency and said 10,000 records would be released daily until the cash is paid. According to the ransom note, more than 3.8 million "identity document numbers", 3.2 million driver's license numbers and four million user data records were exposed in the breach. | |||||||
Optus | Breach | 85 | 4 | 11/2022 | OPT2318111122 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Dennis Su, 19, texted 93 of the telco's customers, demanding they transfer $2000 to a CBA bank account He threatened them for exposing personal information being used for financial crimes. He was having a difficult time being unemployed and wanted to make some quick money. | |||||||
Optus | Cyber Attack | 100 | 6 | 09/2022 | OPT2353111122 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: Hackers have breached Optusโ systems. They accessed names, dates of birth, phone numbers, email addresses, physical addresses and driverโs licence numbers of millions of the telecommunications giantโs customers. Up to 9 million customers had been affected. Many had their contact details exposed to the hackers, who also pilfered even more sensitive details, such as passport and driversโ licence numbers, for a smaller portion of Optus customers. |
Optus Company Subsidiaries

As one of the largest telecommunications companies in Australia, Optus provides mobile, telephony, internet, satellite, entertainment and business network services to more than 10 million customers each day. Our mobile network reaches 98.5 per cent of the Australian population and we are committed to constantly delivering new technologies that will connect more Australians to their friends, families and businesses. We offer a range of pre- and post-paid mobile plans allowing customers to choose a plan that best suits their data and price needs for themselves and their families. Optus is more than just a telco, providing exclusive premium entertainment and sport content across a range of platforms. Whether at youโre at home or on-the-go, you can catch up on the latest TV shows and movies, get closer to the games and players you love with Optus Sport or be the first with tunes on your favourite streaming service and score backstage access to artists with Optus Music. As we move into the next generation, Optus will continue to invest in our people, our communities, our networks and a sustainable future to help create a better and more connected future for Australians.
Access Data Using Our API

Get company history
.png)
Optus Cyber Security News
Legal professional privilege in cybersecurity incident reports โ mere โincantationsโ are not sufficient
The legal purpose must be the dominant purpose for which a document or report comes into existence or a communication is made in order for legalย ...
Optus and Medibank Data Breach Cases Allege Cyber Security Failures
The AIC alleges serious failures in Medibank cyber security. In court filings for a case brought against Medibank by Australia's privacyย ...
Hacked Optus gets award for cybersecurity nous
The telco that failed to prevent the theft of customer details of 10 million Australians, was celebrated on Thursday night for itsย ...
The Australian government has introduced new cyber security laws. Hereโs what you need to know
The Albanese government today introduced long-awaited legislation to parliament which is set to revolutionise Australia's cyber security preparedness.
Ask Us Anything: Cybersecurity expert Karissa Breen answers your burning online safety questions
This month we asked you for questions on cybersecurity, data protection and the best ways to protect your business. Answering your Ask Usย ...
Beneath the surface - exploring the hidden costs of a cyber attack
In today's interconnected digital world, cyber-attacks have become common, impacting businesses, government agencies, and individuals alike.
Australia takes Singtel-owned Optus to court over 2022 cyber attack
Australia's media regulator is taking legal action against telecom carrier Optus, owned by Singapore Telecommunications , over a cyberย ...
Australia revamps cybersecurity plans following a succession of breaches
The Australian government wants to make cybersecurity everyone's responsibility after millions of citizens' details breached in a spate ofย ...
Cyber risk management lessons from Optus data breach
The Optus data breach should serve as a reminder for all organizations that cybersecurity incidents are serious business risks that are costlyย ...

Optus Similar Companies

Telkomsel
We are excited about the future! Here at Telkomsel, we continue to open up a world of more by enabling digital connectivity, digital platforms, and digital services. Over 29 years of serving the nation, we have consistently implemented the latest broadband technology, including 5G. We keep progress

e& UAE
(Formerly etisalat UAE) For more than four decades, we have connected people and now weโve evolved to become the digital telco of the future. Our mission is to grow, transform and excel as the regionโs technology leader while enhancing digital customer experience and operation agility. e& UAE offe

TELUS Communications
TELUS (TSX: T, T.A; NYSE: TU) is a leading national telecommunications company in Canada, with $9.6 billion of annual revenue and 12 million customer connections including 6.5 million wireless subscribers, 4 million wireline network access lines and 1.2 million Internet subscribers and 170,000 TELUS

Amdocs South Africa Joint Enterprise
Amdocs established the Amdocs South Africa Joint Enterprise (ASAJE) as its prime representative in Africa region. ASAJEs aim is to expand Amdocs current presence in South Africa, focusing on South Africa telecom and financial services sectors. Show more

Vivo (Telefรดnica Brasil)
Vivo (Telefรดnica Brasil) is part of the Telefรณnica Group and with more than 94 million customers, of which 75 million mobile and 19 million fixed, we are the largest telecommunications company in Brazil, with nationwide presence and a complete, convergent portfolio of products, combining fixed, mobi

Bharti Enterprises
Bharti Enterprises is one of Indiaรขโฌโขs leading business group with diversified interests in telecom, financial services, real estate, hospitality, agri and food. Bharti has been a pioneering force in the Indian telecom sector with many firsts and innovations to its credit. Bharti Airtel, the group's

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Optus CyberSecurity History Information
How many cyber incidents has Optus faced?
Total Incidents: According to Rankiteo, Optus has faced 4 incidents in the past.
What types of cybersecurity incidents have occurred at Optus?
Incident Types: The types of cybersecurity incidents that have occurred incidents Ransomware, Breach and Cyber Attack.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Data Breach at Optus
Description: Hackers have breached Optusโ systems, accessing personal information of millions of customers.
Type: Data Breach
Threat Actor: Hackers

Incident : Extortion
Title: Extortion Attempt by Unemployed Individual
Description: Dennis Su, 19, texted 93 of the telco's customers, demanding they transfer $2000 to a CBA bank account. He threatened them for exposing personal information being used for financial crimes. He was having a difficult time being unemployed and wanted to make some quick money.
Type: Extortion
Attack Vector: SMS
Threat Actor: Dennis Su
Motivation: Financial Gain

Incident : Data Breach, Ransomware
Title: Optus Data Breach
Description: Optus, a telecommunications company, suffered a data breach that exposed the private information of 10,000 account holders. The hackers, OptusData, demanded a ransom payment of about AUD$1.5 million in Monero cryptocurrency and said 10,000 records would be released daily until the cash is paid. According to the ransom note, more than 3.8 million "identity document numbers", 3.2 million driver's license numbers and four million user data records were exposed in the breach.
Type: Data Breach, Ransomware
Threat Actor: OptusData
Motivation: Financial

Incident : Data Breach
Title: Singtel Data Breach
Description: The personal identification information of about 129,000 customers of Singtel was breached in a cyber attack on data transfer software, Accellionโs FTA that it uses. The stolen data includes name, date of birth, phone number, and address of the customers along with bank account information of some former employees.
Type: Data Breach
Attack Vector: Vulnerability in third-party software (Accellionโs FTA)
Vulnerability Exploited: Accellionโs FTA
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach OPT2353111122
Data Compromised: names, dates of birth, phone numbers, email addresses, physical addresses, driverโs licence numbers, passport numbers

Incident : Data Breach, Ransomware OPT222127922
Data Compromised: Identity document numbers, Driver's license numbers, User data records

Incident : Data Breach SIN18512322
Data Compromised: Name, Date of Birth, Phone Number, Address, Bank Account Information
Systems Affected: Accellionโs FTA
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are names, dates of birth, phone numbers, email addresses, physical addresses, driverโs licence numbers, passport numbers, Identity document numbers, Driver's license numbers, User data records, Personal Identification Information and Bank Account Information.
Which entities were affected by each incident?

Incident : Data Breach OPT2353111122
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: Up to 9 million

Incident : Extortion OPT2318111122
Entity Type: Telco
Industry: Telecommunications
Customers Affected: 93

Incident : Data Breach, Ransomware OPT222127922
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: 10000

Incident : Data Breach SIN18512322
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: 129,000
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach OPT2353111122
Type of Data Compromised: names, dates of birth, phone numbers, email addresses, physical addresses, driverโs licence numbers, passport numbers
Number of Records Exposed: Up to 9 million
Personally Identifiable Information: True

Incident : Data Breach, Ransomware OPT222127922
Type of Data Compromised: Identity document numbers, Driver's license numbers, User data records
Number of Records Exposed: 11000000

Incident : Data Breach SIN18512322
Type of Data Compromised: Personal Identification Information, Bank Account Information
Number of Records Exposed: 129,000
Personally Identifiable Information: Name, Date of Birth, Phone Number, Address
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Extortion OPT2318111122
Ransom Demanded: $2000

Incident : Data Breach, Ransomware OPT222127922
Ransom Demanded: AUD$1.5 million
Additional Questions
General Information
What was the amount of the last ransom demanded?
Last Ransom Demanded: The amount of the last ransom demanded was $2000.
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident were an Hackers, Dennis Su and OptusData.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were names, dates of birth, phone numbers, email addresses, physical addresses, driverโs licence numbers, passport numbers, Identity document numbers, Driver's license numbers, User data records, Name, Date of Birth, Phone Number, Address and Bank Account Information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Accellionโs FTA.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names, dates of birth, phone numbers, email addresses, physical addresses, driverโs licence numbers, passport numbers, Identity document numbers, Driver's license numbers, User data records, Name, Date of Birth, Phone Number, Address and Bank Account Information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 9.1M.
Ransomware Information
What was the highest ransom demanded in a ransomware incident?
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $2000.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
