01:49 PM

Anonymous Leaks Israeli Credit Card Accounts

Saudi hackers allied with Anonymous claim credit for exposure of 400,000 accounts.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
A Saudi hacker group reportedly associated with Anonymous has posted credit card information on what it said represented 400,000 Israeli account holders, but an Israeli credit card firm said most of the accounts were invalid or incorrect and that the total count was far less.

According to Reuters, media reports out of Israel said the hackers had infiltrated multiple websites in Israel and grabbed the credit card data.

Dov Kotler, CEO of Isracard, said in a statement that a file listing 400,000 Israeli credit card numbers had appeared online, but that his firm studied the list and confirmed that around 14,000 of the credit card numbers listed by the hackers were valid, including 6,600 issued by Isracard, according to Reuters.

The hackers claimed to be using the stolen credit card accounts, but Israeli banks have frozen the accounts and won't hold the accountholders responsible for any fraudulent charges. Among the hacked websites were an Israeli sports information website and a local television station, according to reports.

Visitors to One, the Saudi sports site, on Monday evening were redirected to a post on the hacker's site that stated: "We decided to give a new year's gift to the world: the information of about 400,000 Israelis."

Read the rest of this article on Dark Reading.

In today's uncertain and highly scrutinized financial services industry, achieving effective risk management is vital for survival. The report examines the need for enterprise risk management, the benefits of holistic data management, and ERM best practices. Download the report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-12
vpxd in VMware vCenter Server 5.0 before u3e, 5.1 before u3, and 5.5 before u2 allows remote attackers to cause a denial of service via a long heartbeat message.

Published: 2015-10-12
The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.

Published: 2015-10-12
Cisco Unified Computing System (UCS) B Blade Server Software 2.2.x before 2.2.6 allows local users to cause a denial of service (host OS or BMC hang) by sending crafted packets over the Inter-IC (I2C) bus, aka Bug ID CSCuq77241.

Published: 2015-10-12
The process-management implementation in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows local users to gain privileges by terminating a supervised process and then triggering the restart of a process by the root account, aka Bug ID CSCuv12272.

Published: 2015-10-12
HP 3PAR Service Processor SP 4.2.0.GA-29 (GA) SPOCC, SP 4.3.0.GA-17 (GA) SPOCC, and SP 4.3.0-GA-24 (MU1) SPOCC allows remote authenticated users to obtain sensitive information via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.