Saturday, May 24, 2025
HomeCyber Security News70000 Pakistani Banks Credits Cards with PIN Available for Sale...

70000 Pakistani Banks Credits Cards with PIN Available for Sale in Dark Web Markets

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered 2 new databases online that contains a 70000 Pakistani Banks Credit/Debit cards data go sale on the underground market.

Group-IB who were discovered this database estimated the vaule nearly 3.5 million USD and it is one of the big sale of Pakistani banks data on dark web in the past 6 months.

These stolen cards data now available for sale in Joker’s Stash , one of the biggest underground dark web market for stolen credit/debit cards.

- Advertisement - Google News

All the available data are unauthorized digital copies of the information contained in the magnetic stripe of a payment card which belongs to single Pakistani Bank – Meezan Bank Ltd.

Interesting part is that all the cards came to sale with PIN number and the each card price was fixed as $50 which is pretty higher that normal card sale price $10 to $40 on dark web.

2 Different Dumps

First discovered dump contains 1,535 cards data with the title of «PAKISTAN-D+P-01» and 1,457 of which were issued by Meezan Bank Ltd and the card data was set up for sale on Jan. 24, 2019

Second Database bigger than the first one which was on January 30th with the name of The «PAKISTAN-D+P-02» on Joker’s Stash that contains comprised of the details of 67,654 cards of Pakistani banks.

Group-IB said to GBHackers on Securityvia email, ” The sellers marked the set as “high valid” and, unlike the first set, advertised the database on all major underground forums such as («Omerta», «Crdclub», «Enclave» etc.). 96% of all cards in the set were also related to Meezan Bank Ltd.”

Researchers believe that the stolen data from that the leak might be involved in a larger incident, potentially an advanced actor gaining access to card systems within Pakistan.

Related Read

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...