Israeli credit-card hack draws a response
A hacker has released more than 400 credit card numbers allegedly belonging to Saudi Arabian citizens
IDG News Service - More than 400 credit card numbers claimed to belong to Saudi Arabian citizens were released on Tuesday in apparent retaliation for the release of 15,000 active credit card numbers of Israelis last week.
The data was posted publicly on Pastebin" by someone claiming to be an Israeli called Omer Cohen, or "0xOmer" on Twitter. The data includes credit-card numbers and expiration dates. Some entries contain the cardholder's name.
0xOmer also wrote on Twitter that the CVCs, or the three-digit code on the back of the card, would not be released. The code is usually needed to conduct a transaction with an e-commerce vendor over the internet.
One of the victims contacted by e-mail said the credit card number released with his email address was accurate. The victim, who lives in Saudi Arabia, said he had not had time to cancel the card yet.
On Saturday, Israel's Deputy Foreign Minister Danny Ayalon equated cyber attacks with terrorism, saying the country is prepared to respond. The comments followed the release last weeks of tens of thousands of credit card numbers of Israeli citizens by a hacker going by the name "oxOmar."
However, Israel's Banking Supervision Department said last week that only 15,000 of the numbers were active.
On Monday, Ayalon's personal website was targeted by hackers. His website briefly redirected to a different domain containing Arabic messages and the note "Hacked by Foxy + TKL and Gaza HaCKeR Team."
Although efforts to contact Ayalon's office were unsuccessful, he wrote on his Facebook page on Monday that "this morning some Muslim extremists hacked into my website to try and prevent me from continuing to do my work on behalf of the State of Israel, especially my online public diplomacy. We will not be weakened nor silenced by such attempts!"
Send news tips and comments to email@example.com
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts