Threat actors target financial institutions due to the potential for significant financial gains and access to sensitive customer data.
These entities are attractive targets for threat actors seeking lucrative opportunities and avenues for money laundering, fraud, and ransom.
While successfully compromising, the financial institutions can deliver valuable information to the threat actors for future attacks.
The Turkish nationalist hacker group Turk Hack Team recently attacked the world’s largest cooperative financial institution, Crédit Agricole Group.
Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks .
HS banking services faced disruptions as Crédit Agricole’s website and app in France went offline for hours recently, citing ongoing maintenance.
With 25 million customers affected, access issues persisted, but some users reported restoration by the afternoon’s end.
Customers flooded social media with complaints about Crédit Agricole’s inaccessible site and app.
The bank acknowledged a “technical incident,” promising swift resolution, though the message was later removed.
The issue appeared to stem from a DDOS attack by flooding servers to render them inaccessible, reads Le Parisien report.
Turk Hack Team, which was formed in 2022, has claimed responsibility, pledging further attacks on infrastructure and banking systems by aiming to escalate their attacks.
The group made the headlines for attacking La Poste Services (Postal service company) and ANSSI, the French cybersecurity agency, with possible damage in Belgium.
Threat actors were motivated by politics, and they targeted French entities in response to arms deliveries to Armenia.
Last October, France’s former head diplomat mentioned agreements for future military equipment deliveries to Armenia, which sparked the group’s actions.
Despite traditionally relying on Moscow for arms and hosting Russian troops and a military base, Armenia seeks new Western partners as tensions with Russia rise.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…