Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Saudi Hackers Hit Israeli Credit Card Companies

A group of Saudi hackers hit several Israeli targets over the holidays, subsequently releasing credit card details and other personal information on 400,000 individuals. However, the credit firms are stressing that there is no need to panic.

Offered with the hope that the release would “hurt the Zionist pocket,” the Saudi group published the sensitive details over the holiday weekend. On Monday, once the list gained mass attention, it disappeared from the Web.

A group of Saudi hackers hit several Israeli targets over the holidays, subsequently releasing credit card details and other personal information on 400,000 individuals. However, the credit firms are stressing that there is no need to panic.

Offered with the hope that the release would “hurt the Zionist pocket,” the Saudi group published the sensitive details over the holiday weekend. On Monday, once the list gained mass attention, it disappeared from the Web.

Offering assurances to customers that the breach wasn’t as bad as it looked, Isracard and Visa CAL (two issuing firms in Israel) said that in reality, only 18,000 of the leaked credit cards were still valid. The rest of the cards have long since expired. “We blocked all of the cards whose numbers were on the list to online use. They can still be used for regular purchases,” Isracard’s CEO said in a statement to local media.

Isracard and Visa CAL Hacked“First of all, we have to keep this proportionate. We have to differentiate between threats made by Saudi hackers and the facts. We’ve been working through the night and we discovered that contrary to reports, between all the credit card companies in Israel only 14,000 accounts or so have been compromised. That’s about 0.2% of all active accounts in Israel. We will, of course, compensate customers who were compromised – as we routinely do. I’m responsible for my customers. Anyone who suffered damage will be compensated. There is nothing to worry about.”

Visa CAL’s CEO added that the cards issued by his firm were being blocked against phone and Internet purchasing until they were replaced. He too added that customers who were fraudulently charged will be compensated.

At the same time, there have been no reports of the hijacked cards being used. Still, 400,000 people had their personal information posted to the Web, so while the credit card problem isn’t as bad as it was made out to be, that’s a massive target list.

In related news, shortly before the holiday weekend, supporters of AntiSec published a list of nearly 70,000 credit cards stolen during the breach suffered by intelligence firm, Stratfor. According to analysis conducted by Identity Finder, the list contained about 36,000 active credit card accounts, and the necessary personal information associated with them.

In addition, AntiSec released a list of 860,160 password hashes taken from the account registration database maintained by Stratfor. The list contained passwords so weak, that more than 80,000 of them were crackable in less than 5 hours, using basic word lists and less than stellar equipment.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.