Thursday, March 27, 2025
HomeData BreachOnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

OnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

Published on

SIEM as a Service

Follow Us on Google News

OnePlus Website Suffered from Critical Data breach in their Payment card System and attacker stolen more than 40,000 Customers Sensitive Credit information.

One of their payment card system attacked by unknown hackers by injecting malicious script into payment page code that will intercept the card information while being entered by the customer.

Customer who purchased via oneplus.net Website between mid-November 2017 and January 11, 2018, may have been affected.

Few Weeks Before OnePlus Mobile comes with the preinstalled backdoor that provides root access to the affected devices.

Due to this Attack, hackers may have been stolen Sensitive credit card information such as card numbers, expiry dates and security codes.

Also Read: 21-year-old Hacker Jailed for Launching Cyberattacks on Skype, Pokemon, and Google

Injected malicious script intermediately performing while customer entering their Credit card information on their website and attacker capturing the credit card information that will send the sniffed information to attacker directly from the user’s browser.

In this case, OnePlus Customer who has made credit card payments directly to oneplus.net is the only scenario based credit card information may have been stolen.

Following Scenario based customers are not Affected by this Payment card data Breach.

  • Users who paid via a saved credit card should NOT be affected.
  • Users who paid via the “Credit Card via PayPal” method should NOT be affected.
  • Users who paid via PayPal should NOT be affected.
According to OnePlus, Payment fraud is a perennial concern with all online payments. If you notice suspicious charges in your card statement, contact your bank immediately so they can reverse the payment. Our website is HTTPS encrypted, so it’s very difficult to intercept traffic and inject malicious code, however, we are conducting a complete audit.

Infected Payment card server has been quarantined Soon after discovered this breach by OnePlus Security Expert and reinforced all relevant system structures.

OnePlus Informed to their customer regarding this data breach and requested to check your card statement and contact your bank if they find any suspicious charges.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories

A recent discovery has revealed a potential supply chain attack vulnerability in GitHub's CodeQL...

Exim Use-After-Free Vulnerability Enables Privilege Escalation

A significant security threat has been uncovered in Exim, a popular open-source mail transfer...

OpenAI Offers Up to $100,000 for Critical Infrastructure Vulnerability Reports

OpenAI has announced major updates to its cybersecurity initiatives. The company is expanding its...

Splunk RCE Vulnerability Enables Remote Code Execution via File Upload

A severe vulnerability in Splunk Enterprise and Splunk Cloud Platform has been identified, allowing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Four Members of Hacker Group Behind 90 Worldwide Data Breaches Exposed

A recent investigation by Group-IB has shed light on a notorious cybercriminal operating under...

China’s Baidu Compromised in Data Leak, Affecting Users

Chinese tech giant Baidu has faced severe scrutiny after allegations emerged that a top...

Infosys to Pay $17.5M in Settlement for 2023 Data Breach

Infosys, a leading IT services company, has announced that it has reached an agreement...