Thursday, February 22, 2024

70000 Pakistani Banks Credits Cards with PIN Available for Sale in Dark Web Markets

Researchers discovered 2 new databases online that contains a 70000 Pakistani Banks Credit/Debit cards data go sale on the underground market.

Group-IB who were discovered this database estimated the vaule nearly 3.5 million USD and it is one of the big sale of Pakistani banks data on dark web in the past 6 months.

These stolen cards data now available for sale in Joker’s Stash , one of the biggest underground dark web market for stolen credit/debit cards.

All the available data are unauthorized digital copies of the information contained in the magnetic stripe of a payment card which belongs to single Pakistani Bank – Meezan Bank Ltd.

Interesting part is that all the cards came to sale with PIN number and the each card price was fixed as $50 which is pretty higher that normal card sale price $10 to $40 on dark web.

2 Different Dumps

First discovered dump contains 1,535 cards data with the title of «PAKISTAN-D+P-01» and 1,457 of which were issued by Meezan Bank Ltd and the card data was set up for sale on Jan. 24, 2019

Second Database bigger than the first one which was on January 30th with the name of The «PAKISTAN-D+P-02» on Joker’s Stash that contains comprised of the details of 67,654 cards of Pakistani banks.

Group-IB said to GBHackers on Securityvia email, ” The sellers marked the set as “high valid” and, unlike the first set, advertised the database on all major underground forums such as («Omerta», «Crdclub», «Enclave» etc.). 96% of all cards in the set were also related to Meezan Bank Ltd.”

Researchers believe that the stolen data from that the leak might be involved in a larger incident, potentially an advanced actor gaining access to card systems within Pakistan.

Related Read

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities


Latest articles

Beware of New AsukaStealer Steal Browser Passwords & Desktop Screens

An updated version of the ObserverStealer known as AsukaStealer was observed to be advertised as...

US to Pay $15M for Info About Lockbit Ransomware Operator Data

In a significant move against cybercrime, the U.S. government has announced a bounty of...

Earth Preta Hackers Abuses Google Drive to Deploy DOPLUGS Malware

Threat actors abuse Google Drive for several malicious activities due to its widespread use,...

Swiggy Account Hacked, Hackers Placed Orders Worth Rs 97,000

In a startling incident underscoring the growing menace of cybercrime, a woman's Swiggy account...

Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts

A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged....

Google Chrome 122 Update Addresses Critical Security Vulnerabilities

Google has recently unveiled Chrome 122, a significant milestone for the widely used web...

New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

Researchers have discovered that threat actors have been using open-source platforms and codes for...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles