Saturday, January 18, 2025
HomeCyber Security NewsTurk Hack Team Attacked the World’s Largest Cooperative Finance

Turk Hack Team Attacked the World’s Largest Cooperative Finance

Published on

SIEM as a Service

Follow Us on Google News

Threat actors target financial institutions due to the potential for significant financial gains and access to sensitive customer data.

These entities are attractive targets for threat actors seeking lucrative opportunities and avenues for money laundering, fraud, and ransom. 

While successfully compromising, the financial institutions can deliver valuable information to the threat actors for future attacks.

The Turkish nationalist hacker group Turk Hack Team recently attacked the world’s largest cooperative financial institution, Crédit Agricole Group. 

Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

Hackers Attack on Cooperative Financial Institution

HS banking services faced disruptions as Crédit Agricole’s website and app in France went offline for hours recently, citing ongoing maintenance. 

With 25 million customers affected, access issues persisted, but some users reported restoration by the afternoon’s end.

Customers flooded social media with complaints about Crédit Agricole’s inaccessible site and app. 

The bank acknowledged a “technical incident,” promising swift resolution, though the message was later removed.

The issue appeared to stem from a DDOS attack by flooding servers to render them inaccessible, reads Le Parisien report.

Turk Hack Team, which was formed in 2022, has claimed responsibility, pledging further attacks on infrastructure and banking systems by aiming to escalate their attacks.

Telegram Turk Hack Team

The group made the headlines for attacking La Poste Services (Postal service company) and ANSSI, the French cybersecurity agency, with possible damage in Belgium. 

Threat actors were motivated by politics, and they targeted French entities in response to arms deliveries to Armenia. 

Last October, France’s former head diplomat mentioned agreements for future military equipment deliveries to Armenia, which sparked the group’s actions.

Despite traditionally relying on Moscow for arms and hosting Russian troops and a military base, Armenia seeks new Western partners as tensions with Russia rise.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....