Saudi hackers allied with Anonymous claim credit for exposure of 400,000 accounts.
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
A Saudi hacker group reportedly associated with Anonymous has posted credit card information on what it said represented 400,000 Israeli account holders, but an Israeli credit card firm said most of the accounts were invalid or incorrect and that the total count was far less.
According to Reuters, media reports out of Israel said the hackers had infiltrated multiple websites in Israel and grabbed the credit card data.
Dov Kotler, CEO of Isracard, said in a statement that a file listing 400,000 Israeli credit card numbers had appeared online, but that his firm studied the list and confirmed that around 14,000 of the credit card numbers listed by the hackers were valid, including 6,600 issued by Isracard, according to Reuters.
The hackers claimed to be using the stolen credit card accounts, but Israeli banks have frozen the accounts and won't hold the accountholders responsible for any fraudulent charges. Among the hacked websites were an Israeli sports information website and a local television station, according to reports.
Visitors to One, the Saudi sports site, on Monday evening were redirected to a post on the hacker's site that stated: "We decided to give a new year's gift to the world: the information of about 400,000 Israelis."
In today's uncertain and highly scrutinized financial services industry, achieving effective risk management is vital for survival. The report examines the need for enterprise risk management, the benefits of holistic data management, and ERM best practices. Download the report now. (Free registration required.)
New Best Practices for Secure App DevelopmentThe transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Published: 2017-05-08 unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).
Published: 2017-05-08 A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...
Published: 2017-05-08 Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.
Published: 2017-05-08 Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.