The MOVEit Flaw Has Claimed More Victims

Posted in Commentary with tags on August 16, 2023 by itnerd

MOVEit Seems to be the gift that keeps on giving for hackers as two more organizations have been added to the list of victims. Let’s start with The Colorado Department of Health Care Policy & Financing (HCPF)  who was pwned by hackers who targeted IBM according to this notice. And according to this, over 4 million people have been affected.

Ani Chaudhuri, CEO, Dasera had this comment on this massive breach:

Indeed, the MOVEit software breach incident at IBM that led to Colorado HCPF’s data exposure is just the tip of the iceberg in what appears to be a larger vulnerability affecting several organizations. While the specific details about every breached entity might not always be public, it is imperative to understand that the software’s widespread usage makes it an attractive target. The recent disclosure by Colorado State University, which was similarly breached due to the vulnerability in the MOVEit Transfer software, affecting thousands of students and staff, underscores the urgency. If MOVEit’s vulnerability can affect educational institutions of such magnitude, it stands to reason that healthcare providers with a similar reliance on the software could be at equal, if not greater, risk, given the value of health data in the dark market.

In light of these breaches, healthcare providers must take a multi-pronged approach to damage containment:

  • Immediate Assessment: Conduct a rapid and comprehensive assessment to ascertain the extent of the breach. This involves understanding the nature of accessed data, the duration of unauthorized access, and potential secondary access points that the threat actors might have established.
  • Notify Affected Parties: Transparency is essential. Informing affected individuals meets regulatory obligations and allows them to take personal protective measures, such as monitoring for suspicious activities.
  • Enhanced Monitoring: Deploy advanced monitoring solutions to identify suspicious activities or data access patterns. This will help detect any malicious activities from the breach in real-time.
  • Rethink Data Storage and Access: Minimize the exposure of sensitive data by implementing robust data governance principles. This means limiting access based on necessity, employing end-to-end encryption, and frequently auditing data access logs.
  • Software Patching and Updates: Ensure all systems and software are updated with the latest patches. Regularly liaise with software vendors for updates on vulnerabilities and corresponding patches.
  • Employee Training: Often, the success of ransomware campaigns, like the one that exploited the MOVEit vulnerability, hinges on human error. Regular training of staff on the latest cybersecurity threats and maintaining a culture of vigilance can act as the first line of defense.
  • Collaborate and Share Information: Collaborate with other organizations, regulatory bodies, and cybersecurity entities to share knowledge about threats and best practices. This collaborative approach will not only bolster individual defenses but also strengthen the broader healthcare community’s resilience against cyber threats.
  • Cyber Insurance and Legal Counsel: Ensure that cyber liability insurance is in place. A legal team well-versed in cybersecurity issues can also guide on regulatory obligations and potential legal ramifications post-breach.

While the current scenario paints a grim picture, it’s also an opportunity. An opportunity for healthcare providers to reevaluate, reinvent, and fortify their data protection mechanisms, ensuring the sanctity of patient data now and in the future.

Now let’s move on to New York Life who was exposed to the MOVEit Transfer attack via a third-party vendor Pension Benefit Information (PBI):

According to PBI’s letter to the Maine Attorney General, the attack exposed 25,685 NYLIC-related individuals. The breach notification indicates that threat actors accessed individuals’ Social Security numbers (SSNs).

Losing SSNs poses significant risks, as impersonators can use stolen data in tandem with names and driver’s license numbers for identity theft.

Again, Ani Chaudhuri, CEO, Dasera has a comment on this:

The current digital landscape’s complexities have led us into an era where even the most reputable companies are vulnerable to sophisticated cyber-attacks. It’s terrible to see global giants like New York Life Insurance Company (NYLIC), Prudential Insurance, and many others fall prey to the MOVEit Transfer attacks. It underscores the fundamental challenge many corporations face: it’s not just about securing your environment but ensuring that every part of your digital supply chain is equally fortified.

First and foremost, our sympathies should lie with the companies and the millions of individuals impacted by these breaches. Having one’s personal and sensitive information exposed is a severe violation of trust and can have long-lasting repercussions. However, it’s important to remember that in many of these cases, the breached entities themselves were not the primary weak link. Instead, third-party vulnerabilities became the gateway for malicious actors to access data.

In this instance, the trend of targeting third-party vendors and systems, such as PBI, has become increasingly prevalent. It’s a cunning tactic from cybercriminals: why attack the fortress directly when you can exploit a lesser-protected entry point? Herein lies the crux of the issue: in a globally interconnected digital ecosystem, your security posture is only as strong as the weakest link in your chain.

Furthermore, this is not merely an IT or a “tech” problem—it’s a holistic business challenge. Given the increasing interdependence on third-party vendors and platforms for various services, it’s more crucial than ever for organizations to embed data governance and security into their core strategy deeply. As we’ve seen, merely patching software vulnerabilities is a reactive measure; we need proactive, comprehensive approaches that account for the entire data lifecycle and all its touchpoints.

So, what can we take away from this calamity?

  • Third-party Audits: Regularly evaluate and audit the security posture of third-party vendors, especially those with access to sensitive data. Mere assurances or past reputations are no longer sufficient.
  • Comprehensive Data Governance: Implement robust data governance frameworks that provide clear visibility into where and how data is stored, processed, and transmitted—even when outside the direct purview of the company.
  • Shared Responsibility and Collaboration: In the face of such adversities, the business community must come together, share insights, and collectively elevate our defenses against cyber threats. Finger-pointing or laying blame post-facto is counterproductive.

Every organization and individual to empathize with the affected companies and end-users. In today’s intricate digital web, any entity, regardless of size or reputation, can find itself under siege. Instead of distancing ourselves from those affected, we should draw closer, share knowledge, and fortify our collective defense. Cybersecurity isn’t a competitive advantage; it’s a shared responsibility.

In both of these cases, organizations were pwned because some other organization was exposed to MOVEit. Thus you have to wonder how many other organizations are exposed to this threat which right now seems completely out of control.

Does Apple Have A BatteryGate 2.0 Situation With The iPhone 14?

Posted in Commentary with tags on August 15, 2023 by itnerd

You might recall that Apple got into a lot of trouble with the original BatteryGate situation a few years ago. To summarize that situation, Apple got into deep trouble when it was discovered that the performance of iPhones would nosedive when the batteries inside them degraded to the point where they couldn’t sustain the performance levels that users were used to. And Apple did not tell anyone this was the case. Apple since has done a lot to make this clear to users, and they not only allowed users to get their batteries replaced cheaply for a limited time, but they also allowed users to see the health of their battery and offered free replacements if you had AppleCare and the battery health dropped below 80% in the first two years. But, by the time that Apple did all that, it cost them hundreds of millions of dollars and a lot of scrutiny from governments around the world. Which of course wasn’t good for Apple.

History may be repeating itself as there are now reports that the battery health in the iPhone 14 models is dropping faster than previous iPhone models. Here’s a few posts from some prominent creators who are seeing this:

This is now starting to hit the media with media outlets such as The Verge and The Wall Street Journal running stories on this topic. Several iPhone 14 series owners have taken to other places like Reddit to report deteriorating battery capacity on their handsets. 

For giggles I checked the battery health on my iPhone 14 Pro. you can do the same thing by going to Settings –> Battery –> Battery Health & Charging. In my case I got this:

To me that doesn’t seem so bad. But I am missing some context here. Apple doesn’t tell you how many charge cycles that your phone has. By that I mean how many times the battery in my phone has been discharged and charged. I decided to use a utility called Coconut Battery to get that information:

The figure I was looking for was the cycle count. In my case the phone has been discharged and charged 273 times as I type this. And I tend to use wireless charging most of the time which introduces heat to the equation. And heat is the number one enemy of lithium ion batteries when it comes to their longevity. So having 94% battery health (or 95.3% according to Coconut Battery) seems somewhat reasonable to me after just under a year of usage. And to add further context to this, my previous iPhone 12 Pro was at 89% battery health by the time it was a year old. So the iPhone 14 Pro is an improvement for me. But clearly others are having a different experience with their iPhone 14’s.

So is this BatteryGate 2.0? Or put another way, is there an issue with the batteries inside the iPhone 14 models? Perhaps there’s a software issue with iOS 16? I think it’s too early to tell what the issue is and where it lies to be honest. I am sure that when these reports started to surface, Apple started to look at the data that it has access to to figure out if there’s an issue as I am sure that they don’t want a BatteryGate 2.0 situation. Whether we get an answer from Apple directly is an open question as they are not the most communicative company around.

In the meantime, Apple has some tips on how to keep your battery health in the best possible place. That might be worth looking at, along with this document which details how batteries work in relation to iDevices. But let me throw this out there in terms of what I would do if I were you. I would keep an eye on your battery health, but you should not obsess over it. If you have AppleCare, and the battery drops below 80% within two years, Apple will replace the battery for free. (By the way, that’s a great incentive to get AppleCare as it makes this situation a non-issue.)

In the meantime, there needs to be better understanding as to why iPhone 14 models seem to have batteries that degrade faster than previous models in some cases. Having that understanding will help to put this issue to bed. Thus I call on Apple to be as open as it can when it comes to this issue. If they have information on this, they should be as transparent as possible and share it. Otherwise users of iPhone 14’s will just assume that Apple has something to hide and do what they did the last time BatteryGate was a thing. Which is get angry, and sue. And governments will once again assume that Apple has something to hide, investigate, and take corrective action against Apple.

For the rest of us, maybe we should relax and see what comes of this. Maybe there’s something here. Maybe this is a nothing burger. Who knows? But let’s get some facts first to figure out what side of the fence this falls on.

Zoho report finds 63% of Canadian SMBs have not experienced cash flow problems despite the uncertain economy

Posted in Commentary with tags on August 15, 2023 by itnerd

The recently released Cash Flow Report by Zoho, a leading global technology company, reveals that despite the uncertain economy, SMBs are showing a positive business outlook, with 39.7% of respondents indicating that their business is growing and 39.9% stating it’s stable. The majority (63.1%) of financial teams at Canadian small and medium-sized businesses have not experienced cash flow problems.

Surveying 1,219 Canadian financial professionals in June about business performance, cash flow, the economy, and tech usage, Zoho’s Cash Flow Report also reveals that 45% of respondents using accounting software and accountants report business growth, followed by 41.4% saying their business is stable.

On the other hand, 66.3% of SMBs are yet to unlock their business potential with the help of resources like accounting software and accountants, despite clear evidence that respondents who utilize them earn 16.2% more revenue than those who don’t.

Key Survey Findings:

Benefits of Synergy between Accounting Software and Accountants

66% of businesses that use accounting software also utilize services of professional accountants. Of these businesses, 54.7% reported no cash flow problems, demonstrating the effectiveness of professional accounting tools and services.

45% of businesses that use accounting software and accountant services are experiencing growth and 41% are experiencing stability.

The survey also reveals a 16.2% increase in revenue for respondents who employ accounting software and accountants compared to those who do not use these resources.

Economic Downturn Impact

Only 13.8% of respondents attribute cash flow problems to the economic downturn, echoing the optimism reflected in the Zoho Canada SMB Outlook Report where 73.4% of respondents anticipated growth between 1-20+%.

Optimal Cash Flow Management

Over 95% of respondents improved cash flow by optimizing payment terms and providing a variety of payment options, instead of relying solely on loans or credit lines. Respondents are not using debt to improve cash flow.

Advocacy for Accountants

Not surprisingly, 87.9% of respondents highly recommend working with accountants to fellow small business owners, acknowledging the value of professional financial guidance.

Report Methodology

Conducted in June, 2023, using Zoho Survey and Zoho Analytics, this study contacted 1,219 individuals across Canada. Participants in the study included a range of financial team members at small and large enterprises.

Report Dashboard

Click here to access the survey insights.

Ransomware Attack Shuts Down MLS Nationwide 

Posted in Commentary with tags on August 15, 2023 by itnerd

Thousands of Realtor Multiple Listing Services (MLS) across the country were shut down last Wednesday, when their MLS provider, California-based Rapattoni, was hit by a ransomeware attack. “We went from super low inventory to no inventory” said Peter Chabris, CEO of The Chabris Group in Cincinnati. Real estate agents nationwide were unable to search or update any listings.

Coldwell Banker agent Peg King of Petaluma told the therealdeal.com “It’s paralyzed the real estate industry. We can’t add listings. We can’t make price changes. We have no idea how to show properties unless we try to figure out who has something listed.”

Rapattoni provides MLS software and data services nationwide to over 100,000 members. They sent out a memo on Thursday, saying it had been targeted. The service remained down Friday preventing brokers from accessing listings or open house information for the weekend showings.

As of yesterday Rapattoni MLS is still not fully restored for brokers. Some services have been restored, but others are still unavailable. The company say they are working around the clock to restore service and that they hope to have everything back up and running by the end of the week. However, it is possible that the restoration process could take longer.

Carol Volk, EVP, BullWall has this comment:

   “This is a perfect example of how wide the ransomware attack surface has become. This mirrors the increase in attacks we’re seeing on public infrastructure. There’s just no aspect of our lives not impacted by digital transformation which has the unfortunate side effect of making it all vulnerable.  

“Every one of us is a provider of services to others in our social supply chain and we are responsible to those we serve, both locally and across the “chain,” to maintain the highest level of cyber security to both protect our data and our ability to provide service. It has been shown time and again that the follow-on damages of a cyber attack can be much greater than just the loss of data with regards to the direct and imputed costs.”

Emily Phelps, Director, Cyware follows up with this:  

“When an organization serves 100,000+ members, a ransomware attack has far-reaching consequences, for the organization, its members, and their clients. Nothing happens in a vacuum so we must break down the silos that negatively impact cybersecurity.  

“Organizations can shore up their defenses by leveraging automation tools that enable collaboration and threat intel integration so that lean security teams can more efficiently address threats. They should conduct regular security awareness training so employees are armed to recognize and avoid common threat tactics such as phishing attacks; mandate security controls like strong passwords or passphrases and multi-factor authentication; regularly patch and update systems and software; and they should consider third party security partnerships that can act as an extension of their teams, gaining expertise that is more difficult to resource and retain internally.”

Supply chain attacks like these really hurt. Thus you not only need to make sure that you’re secure. But everything that you depend on is also secure. Otherwise, this can happen to you through no fault of your own.

Fisker Adopts NACS Charging Standard

Posted in Commentary with tags on August 15, 2023 by itnerd

Fisker Inc. has announced that they will provide customers with access to Tesla’s Supercharger network.  

The company has announced that it has signed an agreement with Tesla to adopt the North American Charging Standard (NACS) on its first vehicles in 2025. The move will provide Fisker owners with additional charging options, taking advantage of Tesla’s 12,000 Supercharger stations in the United States and Canada.

All current and future Fisker vehicles will be covered by the agreement. Fisker customers will utilize a NACS adapter to plug in at Superchargers starting in Q1 2025. Fisker will later update vehicle engineering to include an NACS inlet. A CCS adapter will be provided so that customers can continue to charge using that standard.

Guest Post: Global VPN Adoption Trends In H1 2023

Posted in Commentary with tags on August 15, 2023 by itnerd

With International VPN Day just around the corner, Atlas VPN presents the latest VPN adoption trends across the globe. During the first half of 2023, global VPN downloads reached 130 million, but where was VPN usage most prominent? With International VPN Day just around the corner, Atlas VPN presents the latest VPN adoption trends across the globe. During the first half of 2023, global VPN downloads reached 130 million, but where was VPN usage most prominent? 

Atlas VPN research team analyzed and ranked 85 countries in terms of VPN usage from 2020 to H1 2023. The VPN penetration rate was calculated by summing up VPN downloads by country and dividing them by the country’s population. The VPN download data was extracted from Google Play and Apple App Store using Sensor Tower and AppTweak services. Download data includes the 45 biggest VPN providers.

See the full VPN Adoption dataset here

Image

In H1 2023, Singapore stood as the torchbearer of VPN adoption, with over 1.1 million downloads among its population of 5.85 million, representing a VPN adoption index of 19.32%. People in Singapore use VPNs for various reasons, includng privacy concerns, security needs, and the desire to access restricted content.

The United Arab Emirates (UAE) secured the second position with 16.94% VPN adoption in H1 2023. Qatar users also continue to be fond of VPN services, with a 15.33% adoption rate.

As expected, Saudi Arabia is among the countries with the highest VPN usage, recording an 11.02% adoption rate.

This consistently high VPN penetration in the Gulf region is caused by strict internet censorship regulations that restrict access to certain websites, social media platforms, and content deemed culturally or politically sensitive.

European landscape: growing interest

The Netherlands witnessed consistent adoption, with a 10.43% rate in H1 2023, suggesting a well-informed populace prioritizing online security. Similarly, the UK displayed a 7.23% adoption rate in H1 2023, indicating that a significant portion of its population recognizes the value of VPNs.

Luxembourg’s adoption rate of 7.09% in H1 2023 shows the country’s continued interest in VPNs. France maintains a notable adoption index of 6.92% and, like many other EU countries, experienced a growth trajectory over the years, reflecting the broader trend of Europeans embracing VPNs.

Conclusion

The journey through VPN adoption from 2020 to H1 2023 presents a fascinating narrative of global digital awareness. The data underscores the heightened awareness of digital privacy, online security, and the significance of maintaining control over one’s online identity. 

Nations like Singapore and the UAE have emerged as trailblazers in VPN adoption, while other countries have shown steady growth.

To see the full VPN Adoption campaign by Atlas VPN, please click here

The Police Service of Northern Ireland Data Leak Just Got Worse Than It Already Is

Posted in Commentary with tags on August 14, 2023 by itnerd

Last week I told you about a data leak involving The Police Service of Northern Ireland where they accidentally published the data on all their staff creating a critical incident in the process. As bad as that is, it just got worse. Here’s the details from Sky News:

The Police Service of Northern Ireland (PSNI) says it fears its officers could be targeted and intimidated after saying it believes that dissident republicans have data on staff that was accidently leaked by the force last week.

“We are now confident that the workforce dataset is in the hands of dissident republicans,” Chief Constable Simon Byrne said.

“It is therefore a planning assumption that they will use this list to generate fear and uncertainty as well as intimidating or targeting officers and staff.”

And:

Earlier, a redacted version of the leaked document that listed the names of police officers in Northern Ireland was posted on a wall facing a Sinn Fein office in Belfast.

Keep in mind that the peace in Northern Ireland is a recent thing because of the Good Friday accords. Thus this data leak doesn’t exactly help this situation which has not been in a good place for a couple of years now. This this situation illustrates that data breaches don’t just have a financial and repetitional impact, they also have a life threatening impact as is illustrated here.

Petro Canada App Users Still Can’t Use The App After The Company Was Pwned By Hackers Two Months Ago

Posted in Commentary with tags on August 14, 2023 by itnerd

In case you’re coming to this story without the full context, let me help you with that. Back in June, Petro Canada and their parent company Suncor were pwned by hackers. That partially took down their gas stations for a few days, and has partially crippled them ever since. Here’s a bunch of stories that you can read that will give you the full background:

Now, about two months after being pwned by hackers, it’s come to my attention that the Petro Canada app is still not working. When users try to log in, they see this:

Having the app in a state where it isn’t working for two months does not inspire confidence to users. And you have to assume that it’s also costing Petro Canada money. Let me give you an example of that. My go to gas stations have always been Esso/Mobil and Petro Canada. And whenever I needed gas, I would go to the closest one. I didn’t really have a preference. Since Petro Canada got pwned, 100% of my gas business goes to Esso/Mobil. And there’s two reasons for that change:

  • The Petro Canada app does not work as mentioned above which is a #fail for me as I use this app to pay at the pump via Apple Pay without putting my credit card into the pump or having to interact with the gas station staff. That’s important for me as gas stations have always been a place where your credit card can be cloned. The app always mitigated that possibility. But since the Petro Canada app doesn’t work, there is no mitigation. However over at Esso/Mobil, this isn’t an issue as their app works fine to pay at the pump.
  • I don’t trust Petro Canada because they haven’t really provided an update of any sort that gives me the confidence to trust them.

The thing with cyberattacks is that there’s financial and repetitional costs to them the longer that the attack affects the public. Petro Canada has entered a place where their reputation has taken a big hit, and this has to be affecting them financially. And I don’t see a scenario at the moment where this ends positively for them. Now Petro Canada is free to prove me wrong on that front. But as long as the public isn’t able to use their app to do anything from pumping gas into their cars, collect and redeem points and the like, Petro Canada isn’t in a good place.

X/Twitter CEO Linda Yaccarino Says That The Company Is Close To Breaking Even…. Yeah Right

Posted in Commentary with tags on August 14, 2023 by itnerd

From the “where have I seen this before” department comes this story where X, or Twitter, or whatever its called CEO Linda Yaccarino is claiming that even with all the chaos caused by Elon Musk, that X/Twitter is somehow close to breaking even:

“I’ve been at the company eight weeks,” Yaccarino said in her first broadcast interview since taking on her new role. “The operational run rate right now… we’re pretty close to break even.”

And:

“Our data licensing and API with X is an incredible business. Our new subscription business [is] growing,” Yaccarino said. “And then, part of my, what I would say, expertise and experience, and what I came to do, was to drive advertising at the company.”

I for one am going to call this for what it is: BS.

The fact is that Twitter/X is a dumpster fire at the moment with advertisers fleeing the platform and traffic to the platform dropping. And I see no scenario where that changes as Elon is clearly intent on burning the platform to the ground. On top of that, Elon has clearly been feeding Yaccarino the toxic Kool Aid that he’s been drinking as she’s parroting his lines based on the story that I linked to. You have to wonder how long it will take before we see the effects of whatever suicide pact that Elon and Yaccarino have entered into.

I Was Targeted In A Rogers Phone #Scam… And This One Is Pretty Scary

Posted in Commentary with tags on August 13, 2023 by itnerd

Earlier this week I told you about an email scam that was using the name of Canadian telco Rogers to make you more likely to fall for it. That scam was pretty bad. But on Friday, I came across an even worse scam that uses the Rogers name.

I got a phone call that had a caller ID of “Rogers” with an area code that started with “888” which is likely spoofed. Now my wife and I haven’t been with Rogers for just over a year, but I decided to pick up the call anyway. When I did a woman asked for my wife. That made sense because the Rogers account was under her name. I told the woman that I was her husband and she could speak to me. That’s when things got interesting. The woman told me that she was calling from “Rogers Customer Loyalty” and our Rogers account was selected as part of a promotion.

This is when I started to get suspicious. Like I said earlier, we haven’t been with Rogers for just over a year. So while I can see a scenario where Rogers might call us to try and get us back, there’s no department within Rogers called “Rogers Customer Loyalty” that would do that. Thus I was starting to think that this was a scam. Normally, this is where I would suggest that you hang up. But I wanted to confirm my suspicions, so I played along.

The woman then said that the promotion in question was that Rogers wanted to give us a free iPhone 14 Pro Max with a 35GB data plan for $50 a month. That really started the alarm bells ringing because Rogers to my knowledge never gives away free phones. Not only that, they don’t as far as I know have a 35GB data plan for $50 a month. Thus I was really thinking that this was a scam. Again, instead of hanging up, I played along.

First they wanted to confirm some information. And the information that they offered up was my wife’s email address and name. Then they wanted me to confirm the order by sending me a six digit verification code.

Ding! This confirms that this is a scam.

What the threat actors are up to are getting access to your Rogers account using your email address so that they can order an iPhone of some description, ship it to some location where this phone and every other phone from anyone who fell for this scam is then shipped to some other country for resale. Likely India given the fact that the person who called me had an Indian accent. The other possibility is that you do get the phone, but they they will call you on the day that you get it and say that they messed up and you need to send the phone back. They’ll email you a “return label” that simply sends the phone to a location from where they can forward the phone overseas. In either case, you get stiffed with the bill for the phone. The threat actors need the six digit verification code to get into your account because Rogers has moved to using using two factor authentication in order to stop threat actors from brute forcing their way into your account.

At this point I hung up, but here’s what concerned me. The threat actors clearly have acquired some accurate information that allows them to perpetrate the scam. It makes me wonder if Rogers had some sort of data breach where this information ended up in the hands of threat actors, or did they use a third party call centre who has a copy of this data and are now using this information for evil purposes? I don’t know for sure. But given that they called me with some very accurate information, the question has to be asked.

So if you get a call like this, what should you do? This is what I suggest:

  1. Hang up and call into Rogers using one of the phone numbers on the Rogers website. The person that you speak to will instantly be able to tell you if you have any offers on your account. Chances are that you don’t have any offers, or not ones that fit this description. Thus validating that this is a scam They may also put a fraud alert on your account for your protection. At the same time, you should also confirm that no changes have been made to your account.
  2. Never, ever give the threat actor the six digit verification code. They may say things to convince you that it’s okay to give them the verification code, but they are lying. No Rogers employee would ever ask for this code. Ever.

A suggestion that I have is that if you get a call like this, you should change the email address that your Rogers account uses. That way you can spot scams like this easier.

In my research for writing this story, I have not heard of a similar scam that targets Bell or TELUS customers. Nor any other telco in Canada. But a Reddit thread that I found seems to validate that I am not the only person who got a call like this. Thus this seems to be strictly targeted towards Rogers customers which adds some weight to the fact that the threat actors clearly have some information to allow them to target Rogers customers. Thus I have to wonder what Rogers is doing to investigate this and address this as this is clearly a threat aimed at former and current Rogers customers. Given the scale of this issue, Rogers needs to say something. And the sooner the better. In the meantime, watch out for this scam.