Thursday, December 19, 2024
HomeCyber Security NewsTurk Hack Team Attacked the World’s Largest Cooperative Finance

Turk Hack Team Attacked the World’s Largest Cooperative Finance

Published on

SIEM as a Service

Threat actors target financial institutions due to the potential for significant financial gains and access to sensitive customer data.

These entities are attractive targets for threat actors seeking lucrative opportunities and avenues for money laundering, fraud, and ransom. 

While successfully compromising, the financial institutions can deliver valuable information to the threat actors for future attacks.

- Advertisement - SIEM as a Service

The Turkish nationalist hacker group Turk Hack Team recently attacked the world’s largest cooperative financial institution, Crédit Agricole Group. 

Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

Hackers Attack on Cooperative Financial Institution

HS banking services faced disruptions as Crédit Agricole’s website and app in France went offline for hours recently, citing ongoing maintenance. 

With 25 million customers affected, access issues persisted, but some users reported restoration by the afternoon’s end.

Customers flooded social media with complaints about Crédit Agricole’s inaccessible site and app. 

The bank acknowledged a “technical incident,” promising swift resolution, though the message was later removed.

The issue appeared to stem from a DDOS attack by flooding servers to render them inaccessible, reads Le Parisien report.

Turk Hack Team, which was formed in 2022, has claimed responsibility, pledging further attacks on infrastructure and banking systems by aiming to escalate their attacks.

Telegram Turk Hack Team

The group made the headlines for attacking La Poste Services (Postal service company) and ANSSI, the French cybersecurity agency, with possible damage in Belgium. 

Threat actors were motivated by politics, and they targeted French entities in response to arms deliveries to Armenia. 

Last October, France’s former head diplomat mentioned agreements for future military equipment deliveries to Armenia, which sparked the group’s actions.

Despite traditionally relying on Moscow for arms and hosting Russian troops and a military base, Armenia seeks new Western partners as tensions with Russia rise.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Fortinet Warns of Critical Vulnerabilitiy Allows Command Injection & File Read

Fortinet, a global leader in cybersecurity solutions, has issued an urgent security advisory addressing...

Critical Chrome Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Google has released a new security update on the Stable channel, bringing Chrome to...

CISA Released Secure Mobile Communication Best Practices – 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to...

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Fortinet Warns of Critical Vulnerabilitiy Allows Command Injection & File Read

Fortinet, a global leader in cybersecurity solutions, has issued an urgent security advisory addressing...

Critical Chrome Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Google has released a new security update on the Stable channel, bringing Chrome to...

CISA Released Secure Mobile Communication Best Practices – 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to...