Wednesday, April 2, 2025
HomeData BreachOnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

OnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

Published on

SIEM as a Service

Follow Us on Google News

OnePlus Website Suffered from Critical Data breach in their Payment card System and attacker stolen more than 40,000 Customers Sensitive Credit information.

One of their payment card system attacked by unknown hackers by injecting malicious script into payment page code that will intercept the card information while being entered by the customer.

Customer who purchased via oneplus.net Website between mid-November 2017 and January 11, 2018, may have been affected.

Few Weeks Before OnePlus Mobile comes with the preinstalled backdoor that provides root access to the affected devices.

Due to this Attack, hackers may have been stolen Sensitive credit card information such as card numbers, expiry dates and security codes.

Also Read: 21-year-old Hacker Jailed for Launching Cyberattacks on Skype, Pokemon, and Google

Injected malicious script intermediately performing while customer entering their Credit card information on their website and attacker capturing the credit card information that will send the sniffed information to attacker directly from the user’s browser.

In this case, OnePlus Customer who has made credit card payments directly to oneplus.net is the only scenario based credit card information may have been stolen.

Following Scenario based customers are not Affected by this Payment card data Breach.

  • Users who paid via a saved credit card should NOT be affected.
  • Users who paid via the “Credit Card via PayPal” method should NOT be affected.
  • Users who paid via PayPal should NOT be affected.
According to OnePlus, Payment fraud is a perennial concern with all online payments. If you notice suspicious charges in your card statement, contact your bank immediately so they can reverse the payment. Our website is HTTPS encrypted, so it’s very difficult to intercept traffic and inject malicious code, however, we are conducting a complete audit.

Infected Payment card server has been quarantined Soon after discovered this breach by OnePlus Security Expert and reinforced all relevant system structures.

OnePlus Informed to their customer regarding this data breach and requested to check your card statement and contact your bank if they find any suspicious charges.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination

French antitrust regulators have imposed a hefty fine of €150 million ($162.4 million) on...

20,000 WordPress Sites at Risk of File Upload & Deletion Exploits

A critical security alert has been issued to WordPress site administrators following the discovery...

Prince Ransomware – An Automated Open-Source Ransomware Builder Freely Available on GitHub

The cybersecurity landscape has witnessed a concerning development with the emergence of "Prince Ransomware,"...

QR Code Phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials

Cybersecurity researchers have identified a growing trend in phishing attacks leveraging QR codes, a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...

LensDeal Data Breach Exposes 100,000 Customers’ Personal Information

A major data breach involving LensDeal, a Netherlands-based contact lens supplier, has reportedly exposed...