Sunday, May 18, 2025
HomeData BreachOnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

OnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

Published on

SIEM as a Service

Follow Us on Google News

OnePlus Website Suffered from Critical Data breach in their Payment card System and attacker stolen more than 40,000 Customers Sensitive Credit information.

One of their payment card system attacked by unknown hackers by injecting malicious script into payment page code that will intercept the card information while being entered by the customer.

Customer who purchased via oneplus.net Website between mid-November 2017 and January 11, 2018, may have been affected.

- Advertisement - Google News

Few Weeks Before OnePlus Mobile comes with the preinstalled backdoor that provides root access to the affected devices.

Due to this Attack, hackers may have been stolen Sensitive credit card information such as card numbers, expiry dates and security codes.

Also Read: 21-year-old Hacker Jailed for Launching Cyberattacks on Skype, Pokemon, and Google

Injected malicious script intermediately performing while customer entering their Credit card information on their website and attacker capturing the credit card information that will send the sniffed information to attacker directly from the user’s browser.

In this case, OnePlus Customer who has made credit card payments directly to oneplus.net is the only scenario based credit card information may have been stolen.

Following Scenario based customers are not Affected by this Payment card data Breach.

  • Users who paid via a saved credit card should NOT be affected.
  • Users who paid via the “Credit Card via PayPal” method should NOT be affected.
  • Users who paid via PayPal should NOT be affected.
According to OnePlus, Payment fraud is a perennial concern with all online payments. If you notice suspicious charges in your card statement, contact your bank immediately so they can reverse the payment. Our website is HTTPS encrypted, so it’s very difficult to intercept traffic and inject malicious code, however, we are conducting a complete audit.

Infected Payment card server has been quarantined Soon after discovered this breach by OnePlus Security Expert and reinforced all relevant system structures.

OnePlus Informed to their customer regarding this data breach and requested to check your card statement and contact your bank if they find any suspicious charges.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious...

Nucor Steel Manufacturer Halts Production After Cyberattack

Nucor Corporation, one of North America’s largest steel producers, has temporarily halted production at...

Customer Data Compromised in Dior Cyber Attack

Luxury fashion house Dior experienced a significant security incident when unauthorized external actors breached...