Tag Archive for: Payment

Online Payment Security Tips That Everyone Should Know


In this digital age, more and more people are making purchases online. This is great for consumers because it means that they have a wider range of choices when it comes to products and services. With just a couple of clicks, you can get food, clothes, video games, and anything else delivered to your door.

This trend is also great for businesses because it allows them to reach a larger audience. However, with this increased convenience also comes an increased risk of fraud and identity theft. That’s why everyone needs to know some basic online payment security tips…many of which we’re going to cover in this article.

Only Buy from Legitimate Sources

First and foremost, you should only buy from legitimate sources. That means companies that have a good reputation and that you can trust. If you’re not sure about a company, do some research online or ask around to see if anyone has heard of them. If in any doubt whatsoever, don’t make the purchase.

Check for SSL Certificates

When you’re on a website where you’re about to make a purchase, take a look at the URL in the address bar. If it starts with “HTTPS” instead of just “HTTP,” that means the site has a secure connection. That’s important because it means any information you enter on the site (including your credit card number) is encrypted and less likely to be intercepted by someone who shouldn’t have it.

HTTPS is short for “Hypertext Transfer Protocol Secure.” It’s the same thing as regular ol’ Hypertext Transfer Protocol (the stuff that makes the internet work), with the addition of security. When you connect to a website using SSL, your computer contacts the website’s server and asks it for its SSL certificate.

Another way to check for an SSL certificate is to look for a lock icon in your browser’s address bar; the padlock means the connection between you and the site is secure.

Check the Terminal

If you’re buying something over the phone and reading out your details, be sure to check the terminal that the business is using. For example, an EFTPOS POS machine is one of the most reliable and secure systems around. When businesses use these machines for manual transactions, you can be sure…

Source…

New malware NullMixer hunts for users’ payment data, cryptocurrencies, social network accounts


Kaspersky researchers have uncovered a new campaign, spreading NullMixer — a malware stealing users’ credentials, addresses, credit card data, cryptocurrencies, and even Facebook and Amazon accounts. Trying to download cracked software from third-party sites, more than 47,500 users were attacked with NullMixer, able to spy on users, capturing any information they’re entering on the keyboard.

NullMixer is actively distributed by cybercriminals via websites offering crack, keygen and activators for downloading software illegally. Such untrustworthy pages always pose a threat for users as instead of providing proper software, they infect victims’ devices with malware. In most cases, users receive adware or other unwanted software, but NullMixer is far more dangerous, as it can download a huge number of Trojans at once, which can lead to a large-scale infection of any computer network.

A typical infection takes place when attempting to download cracked software from one of these sites. The user is repeatedly redirected to a page containing a password-protected archived program and detailed instructions. Everything looks normal as if the user is really about to download the software they need. However, following the instructions, the victim actually launches NullMixer, which drops multiple malware files on the infected machine, including downloaders, spyware, backdoors, bankers and other threats.

Trying to install the desired software the user also receives the detailed download instructions
Trying to install the desired software the user also receives the detailed download instructions

Among the threat families spread via NullMixer is the infamous RedLine stealer that hunts for credit card and cryptocurrency wallet data from infected machines, as well as Disbuk, also known as Socelar. Stealing cookies from Facebook and Amazon with Disbuk, attackers can gain access to the victim’s accounts from these sites, obtaining their credentials, addresses and even payment details.

Curiously, cybercriminals specifically used professional SEO tools in order to maintain the first results of search engines, so they could easily be found when searching for “cracks” and “keygens” over the Internet and could target as many users as possible.

Top Google engine results for “crack software” contain malicious websites delivering NullMixer
Top Google engine results…

Source…

DoorDash hack leaks customer and payment info


DoorDash Inc (NYSE:DASH) confirmed that a hack on its internal systems has compromised personal identifying information, as well as partial payment card information for a smaller set of customers during the data breach.

The food delivery giant revealed that hackers used phished credentials from employees of a third-party vendor to gain access to some of DoorDash’s internal tools.

DoorDash, in its statement, said: “The phishing campaign did not compromise sensitive information and we have no reason to believe that affected personal information has been misused for fraud or identity theft at this time.”

This isn’t the first time that hackers have stolen customer data from DoorDash’s systems. In 2019, the company reported a data breach affecting 4.9 million customers, delivery workers and merchants who had their information stolen by hackers.

What is breached?

For customers, the information accessed by the hackers primarily included names, email addresses, delivery addresses and phone numbers.

For a smaller set of customers, basic order information and partial payment card information (i.e., the card type and last four digits of the card number) were also accessed.

For delivery agents (Dashers), the information breached included the name and phone number or email address. The information affected for each impacted individual may vary.

DoorDash confirms that the hack did not compromise passwords, full payment card numbers, bank account numbers, or social security or social insurance numbers based on its information to date.

Does it affect me?

DoorDash says that a “small percentage” of users were affected by the incident but declined to clarify the scale of the attack.

The company says that it has notified the affected users where required, published information about the incident on its website, and set up a dedicated call centre to answer questions from users.

It also warns the customers to be cautious of unsolicited communications that ask for your personal information or refer you to a web page asking for personal information and to avoid clicking on links or downloading attachments from suspicious emails.

Who did it?

DoorDash has not named the…

Source…

Hackers stole passwords from 140,000 payment terminals


An Android-based payment system has been affected by hackers who have been able to infiltrate its database and gain access to 140,00 payment terminals globally, according to TechCrunch.

The brand, Wiseasy, is well known in the Asia-Pacific region, with its payment terminals used in restaurants, hotels, retail outlets, and schools. Its accompanying Wisecloud cloud service is used for remote management and configuration for its customer’s terminals.

The Wiseasy point of sale system on a table.

Hackers were able to gain access to Wiseasy’s systems through employees’ computer passwords being stolen by malware and ending up on the dark web marketplace, Buguard chief technology officer Youssef Mohamed told TechCrunch.

Buguard is a penetration testing and dark web monitoring startup that observed the hacking of Wiseasy and noted that the bad actors were able to gain control of two of the company’s cloud dashboards, including an “admin” account. Notably, the popular payment system brand lacked commonly recommended security features, such as two-factor authentication.

The publication was able to view screenshots of Wiseasy’s “admin” user account, which shows how the service can control payment terminals remotely, have access to various user data, and have configuration control, such as being able to add users, seeing Wi-Fi names, and plaintext passwords of connected payment terminals. Access in the wrong hands can easily cause such a situation.

Buguard also said its attempts to collaborate with Wiseasy in early July to address the issue were met with canceled meetings. At this point, Mohamed is unable to say whether the breach has been resolved. However, a Wiseasy spokesperson, Ocean An, told TechCrunch that the company had fixed the issue in-house and added two-factor authentication to its systems.

It remains unknown whether Wiseasy will directly tell customers about this hack, according to TechCrunch.

Many cyber-security issues have to do with hackers working to take over control of various programs or services from the back end. A recently resolved zero-day vulnerability was Follina (CVE-2022-30190), which granted hackers access to the Microsoft Support Diagnostic Tool (MSDT).

This tool is commonly associated…

Source…