Teletext Holidays data breach exposes 212,000 customer call recordings

Truly Travels, trading as Teletext Holidays, formed out of the once-popular television information text service. It now advertises package holidays online and completes bookings over the phone.
Verdict discovered the files – which have since been removed – on an unsecured Amazon Web Services server. In total, there were 532,000 files. Of those, 212,000 were audio files from Teletext customers calling its India-based call centre.
The calls took place between the 10 April 2016 and 10 August 2016. They range from a few minutes to up to an hour and, based on accents, appears to involve UK customers. In recordings heard by Verdict, customers can be heard booking holidays, amending bookings, enquiring about trips and making complaints.
Details about each holiday, including flight time, location and cost, can also be heard. In conversations where a holiday is booked, customers also tell the Teletext Holidays employees partial card details. This includes the type of card, name on the card and expiry date.
Instead of saying their card number and three-digit security number, customers type them into the keypad – protecting the most serious financial information. In a very small number of calls, Verdict heard customers begin to say their card number out loud before the call centre operator interjects.
The names and dates of birth of accompanying passengers, such as partners and children, can also be heard.
Teletext Holidays removed all 532,000 files almost immediately after Verdict notified the company. In a statement, a Truly Travel spokesperson (trading as Teletext Holidays) spokesperson said:
“We are in the process of reporting the matter to the ICO, and we will fully comply with our wider legal obligations.
“The company is taking all appropriate steps to ensure that this situation does not occur in the future.”
Customers recorded while on hold
In some calls heard by Verdict, Teletext customers continued to be recorded while putting on hold, with Verdict hearing couples talking privately among themselves. In one, a mother can be heard trying to calm her crying children while she waits.
In another, a couple is placed on hold for several minutes, during which they discuss whether to go ahead with the booking, before whispering “I’m going to hang up”.
The files were stored in a data repository titled ‘speech analytics’. In addition to the audio files, Verdict discovered 9,000 VTT files – a format for providing captions to audio files.
The customer calls appear to have been recorded as part of a call centre analytics project. Verdict asked Teletext to confirm if the exposed data related to a project with Indian technology company Zen3, which Teletext Holidays said: “is not the case”.
In February 2016, Teletext Holidays implemented the natural language artificial intelligence analytics system to turn call centre conversations into text.
In the exposed data, approximately 9,000 phonecalls are accompanied with text transcripts, potentially making it easier for a malicious hacker to scrape for personal data.
Security implications of Teletext Holidays data breach
Personal data, such as email addresses and dates of birth, can prove valuable information for online criminals. It is common for malicious hackers to sell databases containing personal data on underground forums, where it can be merged with additional personal details to create a full identity profile. Data can then be used to carry out identity fraud, phishing or targeted email attacks.
Malcolm Taylor, director of cyber advisory at cybersecurity consultancy ITC Secure, described the Teletext Holidays data breach as “an intelligence feed for hackers”.
“Aside from the painfully obvious ‘please don’t store unencrypted data in unencrypted data stores and be at all surprised when it leaks’, this makes the point very well that the actual medium in which data is stored is irrelevant; the fact that these were voice files makes no difference to the value of the data to hackers,” he told Verdict.
“It all has a dollar value and is saleable online (and will be for sale already). It is also a treasure trove for anyone who wants to build more sophisticated and damaging attacks – it’s an intelligence feed for hackers; this simple leak could spawn many more and worse.”
Taylor added that it would be fairly simple for a criminal to extract data from the audio files, albeit making them slightly longer.
The Teletext Holidays data breach is the latest in a long string of security incidents involving unsecured servers, many of which are provided by Amazon Web Services. AWS, which is the world’s biggest cloud hosting provider with a 34% share of the market, gives businesses the choice to keep the data repositories, known as buckets, public or private.
In many high-profile cases, involving both AWS servers and alternatives, a company has simply forgotten to make the files private. Notable recent examples include a database containing the records of millions of Chinese jobseekers, another containing the details of subscription service MoviePass’ customers and a Honda database containing vital information relating to the company’s network security.
532,000 files were found on GrayhatWarfare, a website that enables users to search unsecured S3 buckets.
Teletext Holidays data breach: Does GDPR apply?
Although the General Data Protection Regulation (GDPR) was introduced two years after the data was initially stored online, the fact that it was still online post-GDPR means the company could be liable for breaching the newer data protection laws. Under GDPR, an organisation can be fined a maximum of 4% of annual global turnover for the mishandling of personal data.
In the year ending 2018, Truly Travel, trading as Teletext Holidays, reported 2018 turnover of £152m, putting the maximum possible fine under GDPR at £6.08m
As data controller, Teletext Holidays is responsible for the protection of its customers’ data. Robert Wassall, director of legal services at cybersecurity firm ThinkMarble, told Verdict that the breach was “serious” and that it was “very likely” that Teletext would receive a fine for the data breach, adding that any third party involved may also be made liable.
He cited the number of individuals affected, the length of time it was left online and the risk of identity fraud as key reasons for the company being likely to be fined.
“Call recording is likely to be seen as very privacy-intrusive,” he added.
Teletext Holidays took the files offline around 5 pm GMT on Thursday, less than two hours after Verdict notified the company. This prompt removal will likely work in Teletext’s favour in any subsequent investigation by the UK’s data regulator, the Information Commissioner’s Office (ICO), said Wassall.
“Ironically, this may affect Teletext themselves more than the hackers,” added Taylor.
“To begin making contact with their affected clients they will have to find their own way of extracting the details – and they will probably find that more difficult than do the attackers. 532,000 records is not the biggest of leaks, but that will be of no comfort to those individuals affected; this is not an insignificant breach. It will be very interesting to see how the ICO respond.”
source verdict
Industry: Cyber Security

Latest Jobs
-
- Lead Cyber Security Incident Response Consultant.
- United Kingdom
- N/A
-
Seeking skilled and passionate UK-based individual for a Lead Cyber Security Incident Response Consultant opportunity 3 core skillsets for the role Hands on technical incident response (triage and planning). Business consultancy (engaging with clients). Commercial awareness. Being able to engage in business growth conversations. Consultancy experience is an essential as it the ability to visit clients and the office. Additional experience will include, but not be limited to: Developing incident response strategies, guides and procedures for effective incident handling Proactive and reactive defense plans based on cyber threat actors' techniques Offering guidance, supervision, and fostering opportunities for team development Significant career development opportunities for the right individuals.
-
- OUTSIDE IR35 Contract- Functional tester- SC clearance Microsoft Windows Server
- London
- Outside IR35 contract
-
Front End Functional tester with SC clearance needed for an Outside IR35 project. Current valid SC clearance is required Experience with functional testing with exchange, sharepoint, SQL and other applications relating across a windows server Migration to 2019. Must be able to get to Central London 3 days a week. Jira, Wiki documentation and automation experience highly desirable.
-
- ForgeRock Consultant- UK
- United Kingdom
- Upto £100,000 plus benefits
-
ForgeRock Consultant/ Architect is require for niche consultancy who are looking to expand their presence within the UK/European Market Looking for a lead IAM architect, ideally with ForgeRock experience but would consider other vendors, But looking for someone who is able to advice and consultant with Clients but have the implementation background so they can get involved in projects as and when needed. Key duties will be: Provider IAM consultancy to clients, with a focus on ForgeRock Product stack ·Responsible for the design and implementation of ForgeRock solutions ·Install and configure ForgeRock stack to meet customer authentication and authorization requirements, ·Design and implement OAuth2 protocol using ForgeRock OpenAM, ·Design and develop OpenAM custom authentication modules, ·Configure ForgeRock stack to protect RESTful API, ·Troubleshoot and support ForgeRock IAM stack. This is a great role to join a niche play as they look to kick of their European expansion
-
- ForgeRock Consultant- Netherlands
- Netherlands
- N/A
-
ForgeRock Consultant required for 6 Month Contract This will be a mix of on site and home based, so need people to be based in the Netherlands We are looking for a lead ForgeRock Technical Consultant/ Architect with strong experience of ForgeRock to lead a new deployment project. ·Responsible for the design and implementation of ForgeRock stack ·Install and configure ForgeRock stack to meet customer authentication and authorization requirements, ·Design and implement OAuth2 protocol using ForgeRock OpenAM, ·Design and develop OpenAM custom authentication modules, ·Configure ForgeRock stack to protect RESTful API, ·Troubleshoot and support ForgeRock IAM stack. ·Designed and developed Restful APIs, This is a great project with an expanding leading IAM player within Europe, We are looking for someone with the above experience, who is comfortable hitting the ground running and taking on the reins at the start of a project