Telus's digital services and outsourcing subsidiary, known as Telus Digital, has publicly recognized a security incident that the attackers said compromised a huge amount of information. The company itself confirmed to the media that it is investigating unauthorized access to "a limited number of our systems" and that it has put in place measures to contain the intrusion, hire forensic experts and notify the relevant authorities.
The details that have come to light come in much of the claim of a extortion group known as ShinyHunters, which claims to have exfiltered almost a petabyte of data over several months. This figure - although striking - has not been independently verified by third parties and should therefore be taken with caution as the investigation progresses. Initial coverage and statements can be found in media specialized in cybersecurity, such as BleepingComputer.

Telus Digital provides critical outsourcing services: customer care, content moderation, data preparation for IA and contact centre operations. This concentration of functions makes BPO providers particularly lucrative targets for attackers, because a single access can reveal data from multiple companies and millions of customers. Telus has said that, for now, its operations remain "fully operational" and that there is no evidence of interruption in connectivity or customer services as the containment continues.
According to the narrative published by the attackers themselves, the starting point was the use of Google Cloud credentials found in filtered data in another incident: the gap that affected the SalSlovak / Drift integration and which resulted in the theft of Salesforce instances. Research by third parties, as published by the Google / Mandiant intelligence team, describe how this stolen information has been used in a chain to identify secrets and access to other cloud services; an analysis can be read on Google Cloud's blog about that incident in cloud.google.com.
The attackers report that, with these credentials, they accessed numerous systems of the company, including a large BigQuery environment, and that they used tools to search for secrets such as trufflehog to locate new tokens and keys that allowed them to pivote within the infrastructure and download massive volumes of information. This technique of "credentials from credentials" is a recurring tactic in campaigns that derive from initial data leaks on SaaS platforms.
The set of information ShinyHunters claims to have is varied: from support data and call records from contact centres to source code, background obtained through verification processes, financial information, Salesforce data and voice support conversations recordings. Among the materials that describe the attackers there would be records of call metadata (time, duration, numbers involved, quality of the call) that, in the wrong hands, can facilitate social engineering fraud or vishing.
In addition to the exfiltration, the attackers started a extortion campaign. According to the Panel & apos; s claims, in February they required $65 million not to disclose the stolen data; Telus, for its part, according to the sources cited, would not have negotiated with the extorters and had opted for forensic investigation and notification as determined by the progress of the inquiries. The company has reported that it implemented additional security measures and that it will inform the affected customers to the extent that their exposure is confirmed.
ShinyHunters is not a new actor in the picture: in recent years he has been linked to multiple campaigns aimed at cloud services and SaaS platforms, especially aimed at obtaining and monetizing data from Salesforce, Google Workspace and other business ecosystems. Mixed tactics such as vishing (calls supplanting technical support to steal credentials and MFA codes) and the abuse of authentication tokens to take control of SSO accounts have also been documented, allowing them to move laterally through environments connected to corporate services. Specialized coverage has analysed the evolution and objectives of this group, for example in BleepingComputer.
For customers and companies that depend on BPO suppliers, this episode highlights a recurring lesson: digital value chain security matters as much as self-security. To review access and secret management policies, apply strict segmentation between services, rotate credentials and adopt early detection systems in cloud environments are essential measures. At the same time, organizations should prepare to respond to incidents that not only affect their systems, but also those of third parties that store or process their information.

From the perspective of end-users, exposure of call recordings, support records or billing data increases the risk of targeted fraud. It is recommended to remain alert to suspicious communications, to activate multifactor authentication in all services that allow it and to verify directly with official suppliers any requests for sensitive information.
As the investigation continues and Telus works with experts and security forces, it remains unknowable about the actual extent of the theft and the final identity of the companies concerned. The company has promised to notify the affected customers "as appropriate" once it is clarified which data were exposed. We will remain pending public updates and forensic reports to confirm the volume and exact nature of the information committed.
In order to further the technical and contextual background of this case, reference analyses and news are available: the coverage of the incident by BleepingComputer, the breakdown of the SalSlovak / Drift incident on the blog of Google Cloud / Mandiant and documentation of tools that have been mentioned by the attackers, such as trufflehog.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...