Attacks/Breaches
1/4/2012
01:49 PM
50%
50%

Anonymous Leaks Israeli Credit Card Accounts

Saudi hackers allied with Anonymous claim credit for exposure of 400,000 accounts.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
A Saudi hacker group reportedly associated with Anonymous has posted credit card information on what it said represented 400,000 Israeli account holders, but an Israeli credit card firm said most of the accounts were invalid or incorrect and that the total count was far less.

According to Reuters, media reports out of Israel said the hackers had infiltrated multiple websites in Israel and grabbed the credit card data.

Dov Kotler, CEO of Isracard, said in a statement that a file listing 400,000 Israeli credit card numbers had appeared online, but that his firm studied the list and confirmed that around 14,000 of the credit card numbers listed by the hackers were valid, including 6,600 issued by Isracard, according to Reuters.

The hackers claimed to be using the stolen credit card accounts, but Israeli banks have frozen the accounts and won't hold the accountholders responsible for any fraudulent charges. Among the hacked websites were an Israeli sports information website and a local television station, according to reports.

Visitors to One, the Saudi sports site, on Monday evening were redirected to a post on the hacker's site that stated: "We decided to give a new year's gift to the world: the information of about 400,000 Israelis."

Read the rest of this article on Dark Reading.

In today's uncertain and highly scrutinized financial services industry, achieving effective risk management is vital for survival. The report examines the need for enterprise risk management, the benefits of holistic data management, and ERM best practices. Download the report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0543
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2015-0544
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value.

CVE-2015-4129
Published: 2015-07-05
SQL injection vulnerability in Subrion CMS before 3.3.3 allows remote authenticated users to execute arbitrary SQL commands via modified serialized data in a salt cookie.

CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report