Friday 2 May 2014

Warning: Voice phishing campaign targets customers at dozens of banks

Unknown  /  at  12:15  /  No comments


Also Read iOS 8 Leaked Images

Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
The vishing—voice phishing—campaign was discovered by researchers from cybercrime intelligence firm PhishLabs while investigating a recent attack against customers of an unnamed midsize bank.
The bank’s customers had received text messages claiming their debit cards had been deactivated and instructing them to call a phone number. An IVR (Interactive Voice Response) system set up at that number asked callers to input their debit card and PIN numbers in order to reactivate the cards, John LaCour, the founder and CEO of PhishLabs said Tuesday in a blog post.
“PhishLabs investigated the attack and uncovered a cache of stolen payment card data belonging to customers of dozens of financial institutions,” LaCour said. “Based on analysis of the recovered cache, we estimate the vishing crew responsible for the attack has stolen the data of 250 cards per day in this vishing campaign.”

Attack of the clones

The researchers believe the attacks are being carried out by a group of cybercriminals from Eastern Europe and that they might be running since October 2013, when one of the rogue phone numbers started being used.

Also Read Google Glass update to bring SMS notifications to iPhone, new Calendar Glassware

“The withdrawal limit on ATM cards are typically $300 per day,” LaCour said. “Using the recently investigated attack as an example, $75,000 can be lost each day of the attack if the stolen cards are used in an ATM cash-out operation.”
Attackers shouldn’t normally be able to clone a card using only the card number and PIN because they cannot obtain the CVV1 (Card Validation Value) or CVC1 (Card Validation Code) that are encoded on the card’s magnetic stripe and are typically used for authentication.
“Unfortunately, some card issuers and payment processors do not authenticate the CVV1/CVC1 code,” LaCour said. “This allows vishing crews, cash-out gangs and other fraudsters to create payment cards using stolen card data and use those cards to directly withdraw funds.”
But even in cases where cloning the card is not possible, cybercriminals can still use card details obtained through vishing to perform card-not-present transactions online or over the phone.
According to LaCour, attackers install their IVR software on hacked servers and route calls to it from compromised VoIP servers. They use free text-to-speech tools to generate the IVR interactive messages and email-to-SMS gateways to send out text messages to thousands of users.
“Targeted companies often encounter difficulties when attempting to mitigate vishing attacks,” LaCour said. “It can take weeks for an organization to navigate the structures of telecom providers, carriers, and service providers and effectively shut down the phone numbers used to scam customers.”
The PhishLabs blog post includes recommendations for both financial institutions and mobile carriers. These include: making sure CVV1/CVC1 is encoded on cards and validated by payment processors; always calling customers from a phone number that’s printed on the back of the card; working with telecom companies to understand their technical and anti-fraud procedures; training customer support personnel to handle vishing reports and putting a response plan in place that involves customer notification.











NOTE: Feel Free To Comment....

Share
Posted in: Posted on: Friday 2 May 2014

0 comments:

About

This blog belong to all our youngster friendz, who believe in sharing their knowledge with others and want to try to hackin', crackin' , full version applications at free of cost.
you will found here valuable stuffs.

Labels

adf.ly blocked (1) android (109) Android and PC (19) android games (11) android news (3) android tricks (43) Antivirus (11) Anvsoft (1) apple (40) asha phones (1) avast (1) avast pro antivirus 8 2013 (1) avg (1) AVG pc tuneup 2013 full version (1) avira (1) blackberry (1) blogspot (2) body_language (1) bootable usb (1) Browsers (16) c cleaner pro + business (1) Cheatbook 2013 (1) Chetan Bhagat (1) compressor (1) crac (1) Crack (1) crack + keygen (2) cyberlink power2go full version (1) daemon tools 5.2 full version (1) daemon tools patch (1) defender (2) dictionary (1) direct link (1) DivX Pro 7 (1) Ebook (2) eset (1) etc (1) facebook (16) Firewall (2) free recharge tricks (1) free sms (1) FRUIT NINJA for windows full version (1) full version (8) Full Version MS Office 13 (1) GTA Sandreas (1) hack (4) hack pc (3) hacking using keylogger (1) hardware (1) hiDownload platinum 8 (1) how to (6) how to install .net (1) HTML (1) idm (1) idm crack (1) IDM full version (1) image editor (2) install .net in windows 8 (1) internet tricks (37) iPhone 5c (2) job (1) k j activator (1) kaspersky (2) keygen (2) leaked images (1) license key (1) manual updates (1) mediafire (1) MEDIAFIRE DOWNLOAD (2) mediafire link (2) mobiles (42) music player (1) nfs most wanted (1) Office 13 Activator (1) official site update (1) offline updates (1) patch (4) PC (3) pc customize (1) PC Drivers (2) pc games (15) pc games cheats (11) PC Software (152) PC tricks (146) PdaNET 3.50 (1) PDF (3) phone specifications (43) pic viewer (3) power iso 5.6 (1) premium zbigz account (1) problem with .net in windows 8 (1) review (11) reviews (2) Revolution 2020 PDF (1) science (2) sharebeast download (6) sharebeast link (2) symbian mobiles (2) tech knowledge (33) Tech News (343) tech reviews (146) Torrent To IDM (1) Tune-Up 2014 Full Version (1) Ubuntu Mobiles (1) video player (13) video tutorial (1) Web design (1) window 8.1 tricks (12) windows 8 activator (1) Windows 8 USB Installer Maker (1) windows phones (16) winrar 5 full version (1)
Copyright © 2014 SimplyGet. WP Theme-junkie converted by Bloggertheme9
Blogger templates. Proudly Powered by Blogger.
Related Posts with Thumbnails