The Update: The company detected suspicious activity on its email systems late last week, prompting an internal investigation that revealed unauthorised access to customer accounts. Of the 1,600 affected users, 34 experienced SIM swaps, allowing attackers to assume control of their phone numbers. This could enable interception of calls, messages, and two-factor authentication codes.
Vocus temporarily disabled access to its email services to contain the incident, reset customer credentials, and reversed the fraudulent SIM swaps. The company has since restored services and stated it has no evidence that financial information was accessed. Impacted customers are being offered free support through IDCare to help monitor for potential identity misuse.
A spokesperson for Vocus said the breach was contained quickly after detection and that additional security controls have been implemented to prevent recurrence.
“Our initial investigation has revealed unauthorised access to approximately 1600 Dodo email accounts, leading to unauthorised SIM swaps on 34 Dodo Mobile accounts,” the spokesperson for Vocus said.
Why It Matters: This breach underscores the growing threat of SIM-swap attacks, which are increasingly being used to bypass SMS-based two-factor authentication. Even small-scale breaches can have significant consequences when they involve control of communication channels.
The incident adds to a string of cyberattacks targeting Australian telecommunications providers in recent years, following major breaches at Optus and Telstra. It highlights the critical need for telcos to harden internal systems, adopt stronger identity-verification procedures, and shift customers toward more secure authentication methods.
For individuals, the attack serves as a reminder to monitor accounts for suspicious activity, enable app-based authentication wherever possible, and promptly report any loss of mobile connectivity.