Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Vishing Scheme Targets Payment Cards of Bank Customers in U.S.

Researchers at PhishLabs have uncovered a spate of vishing attacks (Voice over IP phishing) have been stealing payment card data from customers of U.S. banks.

According to the firm, an attack last week was detected targeting customers of a midsized bank. In the attack, customers received SMS text messages claiming their debit card was deactivated and requesting the customers provide the card and PIN numbers to reactivate it.

Researchers at PhishLabs have uncovered a spate of vishing attacks (Voice over IP phishing) have been stealing payment card data from customers of U.S. banks.

According to the firm, an attack last week was detected targeting customers of a midsized bank. In the attack, customers received SMS text messages claiming their debit card was deactivated and requesting the customers provide the card and PIN numbers to reactivate it.

“PhishLabs investigated the attack and uncovered a cache of stolen payment card data belonging to customers of dozens of financial institutions,” blogged CEO John LaCour. “Based on analysis of the recovered cache, we estimate the vishing crew responsible for the attack has stolen the data of 250 cards per day in this vishing campaign. Further investigation also indicated that one of the phone numbers used in the campaign has likely been used in vishing attacks since October of 2013.”

With a typical withdrawal limit of $300 per day on ATM cards, as much as $75,000 could have been lost each day of the attack.

While not as widespread as online phishing attacks, vishing schemes are often run by professional crews, LaCour explained. After stealing card data, the crews typically sell the information or give it to cash-out crews who either encode the data onto new cards or use it for online shopping.

The operations typically follow a similar process. First, vishers find and compromise vulnerable servers and install IVR (Interactive Voice Response) software. Then they locate a vulnerable VoIP server and hijack the DID (Direct Inward Dialing) function. The next step is to assign a hacked phone number to their IVR system and use free text-to-speech tools to generate recordings and load them into the IVR system.

Afterwards, the attackers send out spam texts containing the hacked phone number to thousands of phone numbers using email-to-SMS gateways. The compromised VoIP server directs incoming calls to the IVR system, where victims are prompted for card data and their PIN. Any data entered is saved and stored locally or sent to a drop site for retrieval, LaCour explained.

“Based on our investigation, we believe this vishing campaign is being carried out by an eastern European vishing crew,” he blogged. 

Advertisement. Scroll to continue reading.

LaCour told SecurityWeek the attackers seem to have been at this for a while, and are estimated to have gone after at least 50 banks during the last three years.

In his blog post, LaCour recommended among other things that organizations make sure CVV1/CVC1 is encoded on cards and validated by their card processor and that they use a caller ID telephone number that matches the number on the bark of the card when calling customers. He also advised mobile carriers to use strong anti-spam controls for email-to-SMS gateways.


*This story was updated with additional commentary.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.