Anonymous Leaks Israeli Credit Card AccountsAnonymous Leaks Israeli Credit Card Accounts
Saudi hackers allied with Anonymous claim credit for exposure of 400,000 accounts.
January 4, 2012
10 Companies Driving Mobile Security
10 Companies Driving Mobile Security (click image for larger view and for slideshow)
A Saudi hacker group reportedly associated with Anonymous has posted credit card information on what it said represented 400,000 Israeli account holders, but an Israeli credit card firm said most of the accounts were invalid or incorrect and that the total count was far less.
According to Reuters, media reports out of Israel said the hackers had infiltrated multiple websites in Israel and grabbed the credit card data.
Dov Kotler, CEO of Isracard, said in a statement that a file listing 400,000 Israeli credit card numbers had appeared online, but that his firm studied the list and confirmed that around 14,000 of the credit card numbers listed by the hackers were valid, including 6,600 issued by Isracard, according to Reuters.
The hackers claimed to be using the stolen credit card accounts, but Israeli banks have frozen the accounts and won't hold the accountholders responsible for any fraudulent charges. Among the hacked websites were an Israeli sports information website and a local television station, according to reports.
Visitors to One, the Saudi sports site, on Monday evening were redirected to a post on the hacker's site that stated: "We decided to give a new year's gift to the world: the information of about 400,000 Israelis."
Read the rest of this article on Dark Reading.
In today's uncertain and highly scrutinized financial services industry, achieving effective risk management is vital for survival. The report examines the need for enterprise risk management, the benefits of holistic data management, and ERM best practices. Download the report now. (Free registration required.)
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report
Build a Case for a Password Manager