IT Risk
29 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Marlon Fraile Cestari from Cyber Security
Scoop.it!

A Chinese gang in Pakistan specializes in ATM Skimmer attacks

A Chinese gang in Pakistan specializes in ATM Skimmer attacks | IT Risk | Scoop.it
SOURCE: Information Security Newspaper http://www.securitynewspaper.com/2016/07/04/chinese-gang-pakistan-specializes-atm-skimmer-attacks/ TAGS: ATM, Chinese gang, Pakistan

The Federal Investigation Agency in Pakistan is investigating a Chinese organization that is specialized in attacking ATM machines by using skimmer devices.

A few days ago I reported the story of the security expert Benjamin Tedesco that has spotted an ATM skimmer during his vacation in Vienna. The ATM skimmer was quite impossible to detect to common people and unfortunately this kind of crimes is becoming frequent.

Security experts are observing an increase in the number of ATM related crimes especially in some countries where banks lack proper countermeasures.

Malware-based attacks, skimming, and ATM black box attacks are even more popular in the criminal underground.

Sometimes the attacks are recorded on CCTV cameras used by banks, it happened a few days ago in Karachi, Pakistan, where CCTV cameras recorded two Chinese nationals installing skimmer device in one of the bank’s ATM.

The crooks replaced the original ATM pin pad with one of their own, the cyber crime unit of the Federal Investigation Agency (FIA) is investigating the case.

According to the ARY News channel, the two Chinese criminals belong to an international organization that specializes in the thefts of payment card data from ATMs.

https://youtu.be/HdaWGkYnboo

The gang operates in Pakistan and steals payment card data to clone them and steal millions from different banks. The stolen data were also used for sending money to accomplices outside Pakistan.



Cyber criminals seem to be very active in Pakistan, early 2015 a group of hackers stole money from Standard Chartered Bank Accounts by hacking the ATMs of the organization in Pakistan.

Pakistan customers of the Standard Chartered Bank received transaction alerts via email and SMS that alerted them about alleged withdrawals of Rs.50, 000 ($500) cash from their bank accounts.

The problem is that hackers stole money from their banking account without any action on their part. Some of the customers didn’t even receive any notification but discovered the theft only when they tried to get money from ATM of their banks and the machines refused to release the cash because the debit cards were blocked.

The interesting aspect of the case is that hackers compromised the ATMs operating from the UK and involving local mules for cash out operations.

In some cases, ATMs represent an easy target for criminals belonging to an international criminal organization. Recently crooks stole in Japan $13 million from 1,400 ATMs in the country. The gang made it a couple of hours by using leaked payment card data to clone customers’ cards.

Source:http://securityaffairs.co/

Information Security Newspaper http://www.securitynewspaper.com/2016/07/04/chinese-gang-pakistan-specializes-atm-skimmer-attacks/
Via David Thomas
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Data Analytics as a Risk Management Strategy - The National Law Review

Data Analytics as a Risk Management Strategy - The National Law Review | IT Risk | Scoop.it
In our increasingly competitive business environment, companies everywhere are looking for the next new thing to give them a competitive edge.
more...
No comment yet.
Rescooped by Marlon Fraile Cestari from IT Risk
Scoop.it!

Saudi Arabia e-security centre to prevent hacking - Apple Balla

Saudi Arabia e-security centre to prevent hacking - Apple Balla | IT Risk | Scoop.it

Riyadh, June 18 — Saudi Arabia has set up a national e-security centre to protect the country's e-system from hackers, a media report said Tuesday.

Several hackers have been attacking government websites to steal data by planting undetected viruses for months, the centre's director, Abdulrahman Al Mueeqal, was quoted as saying by the Al Sharq Al Awsat newspaper.


Read more at http://www.appleballa.com/2013/06/96403/saudi-arabia-e-security-centre-prevent-hacking#Es3ZBlEMmzgcUKRS.99


Via Sheila Weeks, Marlon Fraile Cestari
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Securing, managing HISP-to-HISP communication certificates, via Health IT Security

The healthcare industry is making necessary progress in securing and certifying Health information service provider (HISP)-to-HISP communication.
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Gartner: 7 major trends forcing IT security pros to change - Network World

Gartner: 7 major trends forcing IT security pros to change - Network World | IT Risk | Scoop.it
Gartner: 7 major trends forcing IT security pros to change Network World Ray Wagner, managing vice president of Gartner's secure business enablement group, summed up these forces at the Gartner Security & Risk Management Summit in National Harbor,...
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

User cloud mobility creates new healthcare security options - HealthITSecurity.com

Computing
User cloud mobility creates new healthcare security options
HealthITSecurity.com
One of the hottest topics between among healthcare IT managers is the BYOD management technology.
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Ethical Hacking and Countermeasures - IUPUI Newscenter

Ethical Hacking and Countermeasures - IUPUI Newscenter | IT Risk | Scoop.it
Ethical Hacking and Countermeasures
IUPUI Newscenter
In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems.
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

What Was That You Said About Hacking? - New York Times

What Was That You Said About Hacking? - New York Times | IT Risk | Scoop.it
New York Times
What Was That You Said About Hacking?
New York Times
Cyberspying accusations against China come back to bite Obama. Get Home Delivery Try unlimited access to NYTimes.com for just 99¢. SEE OPTIONS ».
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

UK Bank Fines on Risk Management Failures Rose Sevenfold - Bloomberg

UK Bank Fines on Risk Management Failures Rose Sevenfold - Bloomberg | IT Risk | Scoop.it
UK Bank Fines on Risk Management Failures Rose Sevenfold
Bloomberg
The U.K. markets watchdog increased fines for risk management failings by more than seven times last year, according to a report by the Chartered Institute of Internal Auditors.
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Hacking case:'Foreigner' planted skimming device in Colaba ATM - Economic Times

Hacking case:'Foreigner' planted skimming device in Colaba ATM - Economic Times | IT Risk | Scoop.it
Economic Times Hacking case:'Foreigner' planted skimming device in Colaba ATM Economic Times Police investigating the Axis Bank accounts hacking case, where money from salaried accounts of some policemen was fraudulently withdrawn in Greece,...
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Webinar - Business Continuity, Risk and Climate Adaptation - Continuity Forum

Webinar - Business Continuity, Risk and Climate Adaptation - Continuity Forum | IT Risk | Scoop.it
Webinar - Business Continuity, Risk and Climate Adaptation Continuity Forum The principle theme will be just how vital it is for Business Continuity and Risk Management Professionals to engage in proactive assessment on how climate change may...
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

The Future of Bionic Humans: What's Next in Bio-Hacking? - LiveScience.com

The Future of Bionic Humans: What's Next in Bio-Hacking? - LiveScience.com | IT Risk | Scoop.it
The Future of Bionic Humans: What's Next in Bio-Hacking?
more...
No comment yet.
Rescooped by Marlon Fraile Cestari from Daily Trendings News and Hot Topics On The Web - i4u News
Scoop.it!

Saudi Arabia e-security centre to prevent hacking - Apple Balla

Saudi Arabia e-security centre to prevent hacking - Apple Balla | IT Risk | Scoop.it

Riyadh, June 18 — Saudi Arabia has set up a national e-security centre to protect the country's e-system from hackers, a media report said Tuesday.

Several hackers have been attacking government websites to steal data by planting undetected viruses for months, the centre's director, Abdulrahman Al Mueeqal, was quoted as saying by the Al Sharq Al Awsat newspaper.


Read more at http://www.appleballa.com/2013/06/96403/saudi-arabia-e-security-centre-prevent-hacking#Es3ZBlEMmzgcUKRS.99


Via Sheila Weeks
more...
No comment yet.
Rescooped by Marlon Fraile Cestari from Cyber Security
Scoop.it!

Have you ever seen an ATM skimmer at an automated teller machine?

Have you ever seen an ATM skimmer at an automated teller machine? | IT Risk | Scoop.it
SOURCE: Information Security Newspaper http://www.securitynewspaper.com/2016/06/27/ever-seen-atm-skimmer-automated-teller-machine/ TAGS: ATM, ATM skimmer

The cyber security expert Benjamin Tedesco during his vacation in Vienna, Austria, has spotted an ATM skimmer quite impossible to detect to common people.

Have you ever seen a skimmer while using an ATM?

Unfortunately, we have to admit that it isn’t so easy to find it, in the majority of cases, the victims are not able to discover an ATM installed by crooks. We have learned by numerous reports that these devices look like legitimate ATM components (i.e. card slots, ATM vestibule doors) and are difficult to identify.

The cyber security expert Benjamin Tedesco shared his experience with the media, during his vacation in Vienna, Austria, he spotted an ATM skimmer quite impossible to detect.

Tedesco was attempting to draw some cash from an ATM machine near the St. Stephen’s Cathedral when noticed something of strange.  Ops, it was a credit card skimmer, he described the device as a replica of the card reader.

“While on vacation with my family in Vienna, Austria, I went to grab some cash from an ATM. Being security paranoid, I repeated my typical habit of checking the card reader with my hand as I have 100’s of times. Today’s the day when my security awareness paid off!” Tedesco wrote in a blog post.

The experts inspected the ATM skimmer and he discovered a control board with a four pin connector, the battery pack, and of course a magnetic strip reader.

“it has a battery (the large silver object on the right) some sort of switch (the small silver object in the middle with the small black tab sticking out of it) and of course the control board with the 4 pin connector (the large green board to the left).” continues the post.

Tedesco shared a video to spread awareness on ATM skimmers devices, he invites all to carefully inspect ATM to avoid such kind of attacks.

https://www.youtube.com/watch?v=ll4f0Wim4pM

Another thing to consider is that attack ATM is very simple for criminals, avideo released by Miami Beach Police shows two men installing a credit card skimmer in less than 3 seconds.

Security and fraud experts are observing a significant increase in the number of cyber attacks against the ATMs, in particular, skimming attacks. The popular investigator Brian Krebs recently published an interesting post that warns about an alarming increase of skimming attacks for both American and European banks.

“Skimming attacks on ATMs increased at an alarming rate last year for both American and European banks and their customers, according to recent stats collected by fraud trackers.” wrote Krebs. “The trend appears to be continuing into 2016, with outbreaks of skimming activity visiting a much broader swath of the United States than in years past.”

The FICO Card Alert Service issued several warning about a spikes in ATM skimming attacks.

On April 8, FICO noted that its fraud-tracking service recorded a 546 percent increase in ATM skimming attacks from 2014 to 2015.

Source:http://securityaffairs.co/

Information Security Newspaper http://www.securitynewspaper.com/2016/06/27/ever-seen-atm-skimmer-automated-teller-machine/
Via David Thomas
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Alleged UK hacking of Belgian telecoms firm was far-reaching-reports

Alleged UK hacking of Belgian telecoms firm was far-reaching-reports | IT Risk | Scoop.it
BRUSSELS (Reuters) - Hacking of computers at Belgian telecoms firm Belgacom, alleged to have been carried out by a British spy agency, was more far-reaching than previously thought and went undetected for more than two years, according to reports...
more...
No comment yet.
Rescooped by Marlon Fraile Cestari from IT Risk
Scoop.it!

Gartner: 7 major trends forcing IT security pros to change - Network World

Gartner: 7 major trends forcing IT security pros to change - Network World | IT Risk | Scoop.it
Gartner: 7 major trends forcing IT security pros to change Network World Ray Wagner, managing vice president of Gartner's secure business enablement group, summed up these forces at the Gartner Security & Risk Management Summit in National Harbor,...
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Gartner reveals Top 10 IT Security Myths - Network World

Gartner reveals Top 10 IT Security Myths - Network World | IT Risk | Scoop.it
Economic Times Gartner reveals Top 10 IT Security Myths Network World Network World - When it comes to information security, there are a lot of “misperceptions” and “exaggerations” about both the threats facing businesses and the technologies that...
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Independence Care System revises data security procedures - HealthITSecurity.com

Independence Care System revises data security procedures
HealthITSecurity.com
On May 7, Independence Care System (New York) learned that it had a laptop containing 2,434 patients' data stolen from an employee's home.
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Microsoft: SMB Cloud Security, Privacy Concerns A Matter Of - Dark Reading

Microsoft: SMB Cloud Security, Privacy Concerns A Matter Of - Dark Reading | IT Risk | Scoop.it
Microsoft: SMB Cloud Security, Privacy Concerns A Matter Of
Dark Reading
What keeps one small to midsize business (SMB) away from cloud computing keeps another SMB sold on it: security.
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Risk & policy management group test | SC Magazine

Risk & policy management group test | SC Magazine | IT Risk | Scoop.it
This month we look at risk and policy management tools and we have a lot of them for your consideration.
more...
No comment yet.
Rescooped by Marlon Fraile Cestari from Peter Milsom's Change Delivery Better Mgmt Practice Site
Scoop.it!

Why risk management & strategic planning must synch

Why risk management & strategic planning must synch | IT Risk | Scoop.it

I often ask bankers what they see as their bank's greatest risk. Almost universally I hear "regulations and compliance." But over my career, I have learned that the greatest risk is uninformed or poorly informed strategic decision-making.


Via Peter Milsom
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Flood Risk Management: A Strategic Approach | Asian Development Bank

Flood Risk Management: A Strategic Approach | Asian Development Bank | IT Risk | Scoop.it
What are the best practice approaches to flood risk management? This publication reviews modern approaches to water management in challenging environments, providing new insights into good strategic planning and risk management of water resources.
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

New approach to risk management - Energy Global

New approach to risk management - Energy Global | IT Risk | Scoop.it
New approach to risk management
Energy Global
The role of risk management changes at each level of an organisation in the mining industry. The criteria used to evaluate results will therefore be extremely varied.
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Video: The keys to identifying risk management metrics - TechTarget

Video: The keys to identifying risk management metrics TechTarget IT risk mitigation and strategy has become commonplace as threats from hackers, data breaches and even malicious employees make protecting information vital to everyday business...
more...
No comment yet.
Scooped by Marlon Fraile Cestari
Scoop.it!

Regulatory and Risk Management Pressures Rising for US Banks and Credit ... - Fort Mills Times

Regulatory and Risk Management Pressures Rising for US Banks and Credit ... - Fort Mills Times | IT Risk | Scoop.it
Fort Mills Times
Regulatory and Risk Management Pressures Rising for US Banks and Credit ...
Fort Mills Times
U.S. banks and credit unions are feeling even greater regulatory and risk management pressures than they were at the start of 2013.
more...
No comment yet.