Telus Outage Report in Lac du Bonnet, Manitoba
Some problems detected
Users are reporting problems related to: internet, phone and wi-fi.
Telus offers phone, internet and television services, as well as mobile phone and mobile internet service through Telus Mobility. Telus internet service uses DSL technology. Telus TV relies on satellite or internet television (IPTV). Telus' mobile phone network supports CMS, HSPA and LTE.
Problems in the last 24 hours in Lac du Bonnet, Manitoba
The chart below shows the number of Telus reports we have received in the last 24 hours from users in Lac du Bonnet and surrounding areas. An outage is declared when the number of reports exceeds the baseline, represented by the red line.
March 25: Problems at Telus
Telus is having issues since 04:40 PM EST. Are you also affected? Leave a message in the comments section!
Most Reported Problems
The following are the most recent problems reported by Telus users through our website.
-
Internet (50%)
-
Phone (22%)
-
Wi-fi (11%)
-
TV (7%)
-
E-mail (6%)
-
Total Blackout (4%)
Community Discussion
Tips? Frustrations? Share them here. Useful comments include a description of the problem, city and postal code.
Beware of "support numbers" or "recovery" accounts that might be posted below. Make sure to report and downvote those comments. Avoid posting your personal information.
Telus Issues Reports
Latest outage, problems and issue reports in social media:
-
bijboutique
(@bijboutique1) reported
@TELUS @TELUSsupport How can you call someone and apologize for your wrong doings when you don’t even listen to them. You’re glad I’m having a bad day thanks to @TELUS. YOU SUCK
-
bijboutique
(@bijboutique1) reported
@TELUS if you keep ignoring the complaints how do you expect to improve your service? Maybe you just don’t care #TimeToBoycot Maybe if you start to lose customers then you will figure out people won’t pay for bad service
-
🫎 Grouchy Moose 🫎
(@GrouchyMoose) reported
@Rogers internet goes out. Checked all cables, rebooted the modem, WPS reset. Still not working This stupid Rogers/Shaw merger has caused quite a few problems. AND I DON’T GET A TECH FOR DAYS. When it was just Shaw, I was able to get a tech the very next day. Switch to Telus?
-
Kett
(@Kett4short) reported
@JFN1971 I hang up as soon as I hear them! So think about that @Bell @TELUS and whoever else thinks they are saving money by going offshore.
-
vx-underground
(@vxunderground) reported
Today @BleepinComputer published a story on a company named Telus Digital being compromised by a Threat Group operating under the moniker "ShinyHunters', a reference to Pokemon. GTIG (Google Threat Intelligence Group) has been tracking ShinyHunters under the label UNC6395. UNC6395 has been targeting enterprise organizations since at least August, 2025 by exploiting compromised OAuth tokens to gain access to company SalesForce instances. Upon successful compromise, UNC6395 attempts vertical or horizontal movement by combing through the compromised SalesForce data. At a currently unknown time, UNC6395 successfully compromised Telus' SalesForce instance which allowed them to pivot elsewhere within the organization. The amount of data UNC6395 claims to have compromised is astronomical. They claim to have exfiltrated over ONE PETABYTE of data (compressed as .tar.xz). While Telus has confirmed the compromise, the exfiltration of ONE PETABYTE of data indicates the compromise may have occurred weeks, possibly months, ago. Telus as of this writing has not given additional details on the compromise (more on that later). I am unable to confirm the validity of the data, primarily because I do have the means to reliably comb through a petabyte of data. However, "snippets" and "samples" have been shared. Based off data seen, the compromised appears authentic. Here is a high-level overview of what was allegedly compromised and successfully exfiltrated. - Employee Full Legal Name - Employee National ID Number and/or SSN - Telus hashed passwords, API keys, OAuth tokens - Call record details - Call meta data - Telecom customer PII (First Name, Last Name, Address) - HR records - Agent performance records - SalesForce accounts, contacts, leads, and records - Financial records (ACH routing numbers, etc) - GitHub repository access to an additional 20 organizations adjacent to Telus (20,000 internal source code projects) - Customer and Agent call records in .wav - 14,139 customer database instances, all containing customer PII (unspecified) - GLEAN TELUS background check files. UNC6395 has access to FBI, RCMP, and CISA background checks. - GLEAN TELUS confidential reports on investigations - GLEAN TELUS confidential reports on tax filings (?) - ... just search "GLEAN" on Google If what UNC6395 states is true, this breach impacts approx. 230M companies across the globe. Based on information seen publicly, ... it looks bad. However, as of this writing, Telus has not done anything other than confirm the compromise with some journalists. I suspect they're currently performing a DFIR (Digital Forensics and Incident Response) and forming a strategy to combat this technologically, legally, logistically, and PR-wise. Is UNC6395 telling the truth? Is this compromise as severe as it appears to be? When will TELUS provide more details? Will impacted customers be notified? Is law enforcement mad their background checks are allegedly compromised? Find out next time on Dragon Ball Z
-
bijboutique
(@bijboutique1) reported
@TELUS how much do customers have to pay to get good service? #rude #unprofessional #NoThanks
-
Chloe Carson
(@Global_Index009) reported
Telus investigating cybersecurity incident after unauthorized access to some systems
-
Varnell Hill 🇵🇹🇵🇹🇵🇹🇵🇹
(@Yellowman617) reported
The news today is brutal. Telus Digital is investigating a massive breach. Reports suggest a petabyte of data, customer support logs, PII, SaaS data—is now in the hands of extortionists. This is the "Persistence Paradox." Companies store data to "serve" customers, but that storage becomes a permanent liability. If you have a database, it's a target. If you have a target, you eventually get hit. At Aethelgard, we’ve spent 8 months building the alternative. We don't "protect" a petabyte of data. We ensure the data only exists in a 14μs window of volatile memory. Once the transaction is done, the data is liquidated. No database. No target. No petabyte-scale extortion. The Sovereign Command Tier launches Sunday. It’s time to move from "Breach Notification" to Forensic Nullity.....
-
Nikki 🇨🇦
(@Mis_Nim) reported
I can only assume this was because the people I was speaking to and having a difficult time understanding were also having a difficult time understanding me The fourth person I spoke to fixed the issue Fast forward to today and I recieve a $200 bill from Telus
-
JJames
(@TorontoMan06) reported
Warning Canadians today about a massive @TELUSsupport breach that has EXTREME implications for ALL customers. If you're a telus customer change all passwords, pin numbers, security codes everything. Also I'd be calling asking for an explanation, compensation and demanding they replace the device as hackers can use information obtained to attempt to take over your account/device. Some details: Telus Digital has confirmed it is investigating a cybersecurity incident involving unauthorized access to a limited number of its systems. The confirmation follows claims by the hacking and extortion group ShinyHunters that they stole nearly 1 petabyte (1,000 terabytes) of data in a multi-month breach. The hackers claim to have accessed data related to Telus's business process outsourcing (BPO) operations, as well as call records for its consumer telecommunications division. This allegedly includes: Personally identifiable information (PII) of customers. Voice recordings of support calls and detailed call metadata (time, duration, numbers). Internal source code and financial information. Information related to approximately 28 well-known client companies served by Telus Digital.