Israeli credit-card hack draws a response
A hacker has released more than 400 credit card numbers allegedly belonging to Saudi Arabian citizens
IDG News Service - More than 400 credit card numbers claimed to belong to Saudi Arabian citizens were released on Tuesday in apparent retaliation for the release of 15,000 active credit card numbers of Israelis last week.
The data was posted publicly on Pastebin" by someone claiming to be an Israeli called Omer Cohen, or "0xOmer" on Twitter. The data includes credit-card numbers and expiration dates. Some entries contain the cardholder's name.
0xOmer also wrote on Twitter that the CVCs, or the three-digit code on the back of the card, would not be released. The code is usually needed to conduct a transaction with an e-commerce vendor over the internet.
One of the victims contacted by e-mail said the credit card number released with his email address was accurate. The victim, who lives in Saudi Arabia, said he had not had time to cancel the card yet.
On Saturday, Israel's Deputy Foreign Minister Danny Ayalon equated cyber attacks with terrorism, saying the country is prepared to respond. The comments followed the release last weeks of tens of thousands of credit card numbers of Israeli citizens by a hacker going by the name "oxOmar."
However, Israel's Banking Supervision Department said last week that only 15,000 of the numbers were active.
On Monday, Ayalon's personal website was targeted by hackers. His website briefly redirected to a different domain containing Arabic messages and the note "Hacked by Foxy + TKL and Gaza HaCKeR Team."
Although efforts to contact Ayalon's office were unsuccessful, he wrote on his Facebook page on Monday that "this morning some Muslim extremists hacked into my website to try and prevent me from continuing to do my work on behalf of the State of Israel, especially my online public diplomacy. We will not be weakened nor silenced by such attempts!"
Send news tips and comments to email@example.com
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts