Feeds

Saudi hackers plaster 14,000 credit card privates on web

Raid on Israeli sites exposes up to 400,000 punters

Seven Steps to Software Security

A Saudi Arabian hacking group claims it has leaked information on up to 400,000 Israelis, including names, addresses and credit card details.

The data dump follows a reported attack on Israeli websites and has already led to fraudulent use of the sensitive info. Credit card biz Isracard said it had issued 6,600 of the 14,000 cards revealed.

However Dov Kotler, chief exec of Isracard, a unit of Bank Hapoalim, said that much of the data is either "incorrect or invalid", Reuters reports. Only an unspecified percentage of the credit card details released were were actually valid. Even so the lifted data trove has been used to make a number of unauthorised internet purchases.

Kotler said Isracard has blocked transactions on cards that have been exposed, adding that anybody who suffered any losses as a result of the breach will be reimbursed. In the meantime the firm has set up an app on its website so that customers can find out if they are affected, a development that by itself suggests that a substantial number of people have been hit.

Israeli paper Haaretz reports that Israeli credit card companies say leaked list is repetitive and only includes the details of 14,000 Israelis. Much of the data came from a hack on popular sports website One.co.il, it adds.

The data dump was carried out by a member of group-xp, the self-described "largest Wahhabi hacker group of Saudi Arabia". In a statement accompanying the release, the group said it had already used the stolen credit cards to purchase computing resources, such as VPNs and renting cloud clusters. It released the data partly to put Israeli banks at the expense of issuing new credit cards and partly through a desire a make Israeli-issued credit cards more untrusted globally.

The statement links to a series of files that purport to offer details on 400,000 credit cards. One of these five files is marked "184 working fresh Israeli credit cards", a tacit admission by the hackers that data in the other files is outdated and therefore high on useless. Other uploaded files claim to offer personal information on more than 22,000 Israeli business people - names, addresses, phone numbers, passwords and so on. Another file purports to offer information on 500 people who donated to "Israeli Zionist Rabbis". ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.