Thursday, February 27, 2025
HomeData BreachOnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

OnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

Published on

SIEM as a Service

Follow Us on Google News

OnePlus Website Suffered from Critical Data breach in their Payment card System and attacker stolen more than 40,000 Customers Sensitive Credit information.

One of their payment card system attacked by unknown hackers by injecting malicious script into payment page code that will intercept the card information while being entered by the customer.

Customer who purchased via oneplus.net Website between mid-November 2017 and January 11, 2018, may have been affected.

Few Weeks Before OnePlus Mobile comes with the preinstalled backdoor that provides root access to the affected devices.

Due to this Attack, hackers may have been stolen Sensitive credit card information such as card numbers, expiry dates and security codes.

Also Read: 21-year-old Hacker Jailed for Launching Cyberattacks on Skype, Pokemon, and Google

Injected malicious script intermediately performing while customer entering their Credit card information on their website and attacker capturing the credit card information that will send the sniffed information to attacker directly from the user’s browser.

In this case, OnePlus Customer who has made credit card payments directly to oneplus.net is the only scenario based credit card information may have been stolen.

Following Scenario based customers are not Affected by this Payment card data Breach.

  • Users who paid via a saved credit card should NOT be affected.
  • Users who paid via the “Credit Card via PayPal” method should NOT be affected.
  • Users who paid via PayPal should NOT be affected.
According to OnePlus, Payment fraud is a perennial concern with all online payments. If you notice suspicious charges in your card statement, contact your bank immediately so they can reverse the payment. Our website is HTTPS encrypted, so it’s very difficult to intercept traffic and inject malicious code, however, we are conducting a complete audit.

Infected Payment card server has been quarantined Soon after discovered this breach by OnePlus Security Expert and reinforced all relevant system structures.

OnePlus Informed to their customer regarding this data breach and requested to check your card statement and contact your bank if they find any suspicious charges.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

US Employee Background Check Firm Hacked, 3 Million Records Exposed

DISA Global Solutions, a Houston-based provider of employee background checks and workplace safety services,...