Friday, March 29, 2024

Hackers Steal the Credit Cards Information of Buckle, Inc by Injecting Malware in Their Payment Data Systems

One of the biggest Retailer in US Buckle, Inc under Cyber Attack in their Payment card Data systems where hacker inject a Malware to steal the Customers Credit card data and company operates 465 stores in 44 U.S .

This Malicious Software was identified Buckle retail store location point-of-sale (POS) system.according to the forensic report, this Malware silently record the customers Credit card information including Account number, account holder’s name, and expiration date .

Malware installed on cash registers at Buckle retail stores Point of sale and purchases made on its online store were not affected.

Buckle believes that certain payment cards used in its stores between October 28, 2016 and April 14, 2017 may have been affected.

This Malware only affected in certain period of time in a day at point of sale and malware did not collect data from all transactions or all POS systems.

Also Read  Zomato’s Massive Data Breach About 17 Million User Record Stolen and Revealed in Dark web

Information’s collected from magnetic stripe

EMV-capable card terminals,has been equipped in all the stores.Point of sale machine  accessed with secure chip-based credit and debit cards .

Once card has been inserted ,Malware copied the information from the magnetic stripe  which leads to hackers clone the card with the stolen information .

According to Buckle, There is no indication that other guest information was collected and no indication that any information submitted through Buckle.com was affected.

After Finding the Malicious Code and external IP addresses, It has been removed from the Buckle, Inc Network and potentially compromised systems were isolated, and malware-related files residing on Buckle’s systems were eradicated ,Buckle said.

Buckle Advised to their Customer that if there is any unauthorized activities found in their Bank account, individuals closely monitor their payment card account statements, then Contact the bank immediately and make sure that they are safe.

Also Read  VISA Card under “Distributed guessing attack” just 6 seconds to verify Visa card details

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles