DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TalkTalk and “Glubz” (updated)

Posted on November 5, 2015 by Dissent

For reasons that are too contorted or convoluted to fully explain, I’ve been keeping an eye on a number of Twitter accounts that I suspect include those arrested for the TalkTalk breach. But Brian Krebs dug deeper, and gives a master class on identifying “Glubz” (@Fearful).

[material deleted, Jan. 4, 2018]

Update: As TalkTalk continues to revise its estimates of the number affected – now claiming that 156,959 were impacted – the Daily Mail reports that this was not an attack by criminal masterminds and was just some kids having a laugh. If so, then it’s unfortunate if their lives should be ruined by this. But it also raises even more questions about how seriously TalkTalk took data protection if a bunch of kids with no sophisticated skills could do this.

Update January 4, 2018:  This post originally contained a quote from a report by Brian Krebs that linked to images and personal information on an identified minor. While removing the material from this post doesn’t really do much in the grand scheme of things as a search for his nick or handle will lead to his real identity within a minute or so,  linking to dox that may reveal his family’s information or location is not something this site wants to be doing.

So at Glubz’s request, I’ve removed the material. For now. If I find out he isn’t keeping his nose clean and trying to go straight, I’ll consider re-posting all of the original material.

 

Category: Business SectorCommentaries and Analyses

Post navigation

← TalkTalk offers customer £30.20 ‘final settlement’ after crims nick £3,500
UT: Sensitive student information improperly released in 5,500 transactions, report says →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.