Wednesday, May 7, 2025
HomeCyber Security News70000 Pakistani Banks Credits Cards with PIN Available for Sale...

70000 Pakistani Banks Credits Cards with PIN Available for Sale in Dark Web Markets

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered 2 new databases online that contains a 70000 Pakistani Banks Credit/Debit cards data go sale on the underground market.

Group-IB who were discovered this database estimated the vaule nearly 3.5 million USD and it is one of the big sale of Pakistani banks data on dark web in the past 6 months.

These stolen cards data now available for sale in Joker’s Stash , one of the biggest underground dark web market for stolen credit/debit cards.

- Advertisement - Google News

All the available data are unauthorized digital copies of the information contained in the magnetic stripe of a payment card which belongs to single Pakistani Bank – Meezan Bank Ltd.

Interesting part is that all the cards came to sale with PIN number and the each card price was fixed as $50 which is pretty higher that normal card sale price $10 to $40 on dark web.

2 Different Dumps

First discovered dump contains 1,535 cards data with the title of «PAKISTAN-D+P-01» and 1,457 of which were issued by Meezan Bank Ltd and the card data was set up for sale on Jan. 24, 2019

Second Database bigger than the first one which was on January 30th with the name of The «PAKISTAN-D+P-02» on Joker’s Stash that contains comprised of the details of 67,654 cards of Pakistani banks.

Group-IB said to GBHackers on Securityvia email, ” The sellers marked the set as “high valid” and, unlike the first set, advertised the database on all major underground forums such as («Omerta», «Crdclub», «Enclave» etc.). 96% of all cards in the set were also related to Meezan Bank Ltd.”

Researchers believe that the stolen data from that the leak might be involved in a larger incident, potentially an advanced actor gaining access to card systems within Pakistan.

Related Read

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its...

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify...

Severe Kibana Flaw Allowed Attackers to Run Arbitrary Code

A newly disclosed security vulnerability in Elastic’s Kibana platform has put thousands of businesses...

IT Worker from Computacenter Let Girlfriend Into Deutsche Bank’s Restricted Areas

A former information technology manager has filed a whistleblower lawsuit alleging a major security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its...

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify...

Severe Kibana Flaw Allowed Attackers to Run Arbitrary Code

A newly disclosed security vulnerability in Elastic’s Kibana platform has put thousands of businesses...