Teletext Holidays data breach exposes 212,000 customer call recordings
Truly Travels, trading as Teletext Holidays, formed out of the once-popular television information text service. It now advertises package holidays online and completes bookings over the phone.
Verdict discovered the files – which have since been removed – on an unsecured Amazon Web Services server. In total, there were 532,000 files. Of those, 212,000 were audio files from Teletext customers calling its India-based call centre.
The calls took place between the 10 April 2016 and 10 August 2016. They range from a few minutes to up to an hour and, based on accents, appears to involve UK customers. In recordings heard by Verdict, customers can be heard booking holidays, amending bookings, enquiring about trips and making complaints.
Details about each holiday, including flight time, location and cost, can also be heard. In conversations where a holiday is booked, customers also tell the Teletext Holidays employees partial card details. This includes the type of card, name on the card and expiry date.
Instead of saying their card number and three-digit security number, customers type them into the keypad – protecting the most serious financial information. In a very small number of calls, Verdict heard customers begin to say their card number out loud before the call centre operator interjects.
The names and dates of birth of accompanying passengers, such as partners and children, can also be heard.
Teletext Holidays removed all 532,000 files almost immediately after Verdict notified the company. In a statement, a Truly Travel spokesperson (trading as Teletext Holidays) spokesperson said:
“We are in the process of reporting the matter to the ICO, and we will fully comply with our wider legal obligations.
“The company is taking all appropriate steps to ensure that this situation does not occur in the future.”
Customers recorded while on hold
In some calls heard by Verdict, Teletext customers continued to be recorded while putting on hold, with Verdict hearing couples talking privately among themselves. In one, a mother can be heard trying to calm her crying children while she waits.
In another, a couple is placed on hold for several minutes, during which they discuss whether to go ahead with the booking, before whispering “I’m going to hang up”.
The files were stored in a data repository titled ‘speech analytics’. In addition to the audio files, Verdict discovered 9,000 VTT files – a format for providing captions to audio files.
The customer calls appear to have been recorded as part of a call centre analytics project. Verdict asked Teletext to confirm if the exposed data related to a project with Indian technology company Zen3, which Teletext Holidays said: “is not the case”.
In February 2016, Teletext Holidays implemented the natural language artificial intelligence analytics system to turn call centre conversations into text.
In the exposed data, approximately 9,000 phonecalls are accompanied with text transcripts, potentially making it easier for a malicious hacker to scrape for personal data.
Security implications of Teletext Holidays data breach
Personal data, such as email addresses and dates of birth, can prove valuable information for online criminals. It is common for malicious hackers to sell databases containing personal data on underground forums, where it can be merged with additional personal details to create a full identity profile. Data can then be used to carry out identity fraud, phishing or targeted email attacks.
Malcolm Taylor, director of cyber advisory at cybersecurity consultancy ITC Secure, described the Teletext Holidays data breach as “an intelligence feed for hackers”.
“Aside from the painfully obvious ‘please don’t store unencrypted data in unencrypted data stores and be at all surprised when it leaks’, this makes the point very well that the actual medium in which data is stored is irrelevant; the fact that these were voice files makes no difference to the value of the data to hackers,” he told Verdict.
“It all has a dollar value and is saleable online (and will be for sale already). It is also a treasure trove for anyone who wants to build more sophisticated and damaging attacks – it’s an intelligence feed for hackers; this simple leak could spawn many more and worse.”
Taylor added that it would be fairly simple for a criminal to extract data from the audio files, albeit making them slightly longer.
The Teletext Holidays data breach is the latest in a long string of security incidents involving unsecured servers, many of which are provided by Amazon Web Services. AWS, which is the world’s biggest cloud hosting provider with a 34% share of the market, gives businesses the choice to keep the data repositories, known as buckets, public or private.
In many high-profile cases, involving both AWS servers and alternatives, a company has simply forgotten to make the files private. Notable recent examples include a database containing the records of millions of Chinese jobseekers, another containing the details of subscription service MoviePass’ customers and a Honda database containing vital information relating to the company’s network security.
532,000 files were found on GrayhatWarfare, a website that enables users to search unsecured S3 buckets.
Teletext Holidays data breach: Does GDPR apply?
Although the General Data Protection Regulation (GDPR) was introduced two years after the data was initially stored online, the fact that it was still online post-GDPR means the company could be liable for breaching the newer data protection laws. Under GDPR, an organisation can be fined a maximum of 4% of annual global turnover for the mishandling of personal data.
In the year ending 2018, Truly Travel, trading as Teletext Holidays, reported 2018 turnover of £152m, putting the maximum possible fine under GDPR at £6.08m
As data controller, Teletext Holidays is responsible for the protection of its customers’ data. Robert Wassall, director of legal services at cybersecurity firm ThinkMarble, told Verdict that the breach was “serious” and that it was “very likely” that Teletext would receive a fine for the data breach, adding that any third party involved may also be made liable.
He cited the number of individuals affected, the length of time it was left online and the risk of identity fraud as key reasons for the company being likely to be fined.
“Call recording is likely to be seen as very privacy-intrusive,” he added.
Teletext Holidays took the files offline around 5 pm GMT on Thursday, less than two hours after Verdict notified the company. This prompt removal will likely work in Teletext’s favour in any subsequent investigation by the UK’s data regulator, the Information Commissioner’s Office (ICO), said Wassall.
“Ironically, this may affect Teletext themselves more than the hackers,” added Taylor.
“To begin making contact with their affected clients they will have to find their own way of extracting the details – and they will probably find that more difficult than do the attackers. 532,000 records is not the biggest of leaks, but that will be of no comfort to those individuals affected; this is not an insignificant breach. It will be very interesting to see how the ICO respond.”
source verdict
Industry: Cyber Security
Latest Jobs
-
- VOIP / SIP App Developer. Contract. SIP | VOIP experience needed. SC Cleared Outside IR35 Contract. London
- London
- OUTSIDE IR35
-
SIP | VOIP Developer. SC Cleared Contract. London Looking for a SC Cleared SIP / VOIP Developer to develop an application that interacts with a set of voice and video signalling API’s You will also work on developing in-house applications, browser plugins and automated tooling to support secure communication systems. Responsibilities Develop an application that will manage number mapping and associated identities using commercial SBC API’s. Develop new user-facing features using React.js or other modern JavaScript frameworks. Build reusable components and front-end libraries for future use. Collaborate with the design team to translate UI/UX design wireframes into code. Work closely with backend developers to integrate front-end code with server-side logic. Conduct code reviews and provide constructive feedback to team members. Stay up-to-date on emerging technologies and industry trends to continuously improve our front-end development practices. Troubleshoot and debug issues that arise during development and in production environments. Maintain high coding standards and practices and ensure code is well-documented. Requirement Experience of developing specialist applications using REST API’s. Good knowledge of Go, Java and Python (open to alternative combinations of languages). Proficiency in front-end languages and frameworks such as HTML, CSS, JavaScript, React.js, etc. Strong understanding of web standards, responsive design, and cross-browser compatibility. Experience with version control systems such as Git. Knowledge of RESTful APIs and asynchronous request handling. Familiarity with UI/UX design principles and tools.
-
- Senior Data Privacy Consultant. Client Facing | London
- London
- N/A
-
Senior Data Privacy Consultant. Client Facing | London Senior Data Privacy Consultant needed for a key client facing opportunity. Must be willing to undergo SC Security Clearance. Hybrid role- onsite with customer / office 2-3 days a week. London Key Responsibilities: Lead and support client facing data privacy projects. Assess compliance, define and deliver strategic projects / implement privacy solutions. Manage project teams and develop business opportunities. Required Experience: Experience in data protection and privacy standards. Background in consulting. Skills and Qualifications: Business consulting experience IAPP Privacy Manager / Privacy Technologist Location Greater London UK based role. Not able to provide VISA sponsorship.
-
- Security Analyst - Internal role. London commutable. Permanent
- London
- N/A
-
Security Analyst - Internal role. London commutable opportunity. Operational Security - Investigate, escalate and proactively work to ensure household name remains protected. Project Security - Coordinate, log change requests with project delivery teams to meet security requirements Policy / compliance - work with team to aid in uplifting these as and where needed This role is role to investigate, escalate and proactively work to protect a globally recognised brand. You must have current hands on operational analytical security experience with Microsoft technology stack Someone with a SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1