Hackers hunt hackers in credit card company compromise

Hackers have published data about alleged cyber criminal activity at a credit card processor company.

Hacker

A group of hackers has published information about potentially illicit activities at an online credit card processor company.

The anonymous crew claimed to have compromised a server of the unnamed credit card processing company, taking data from employee emails and recorded phone calls, according to Trend Micro's TrendLabs team.

One recorded conversation discussed defrauding major credit card companies, while another mentioned Fethard - a payment service that has been associated with cyber crime activities such as money laundering.

It has also been suggested that the compromised company is the parent of Fethard, through which payments for fake anti-virus products and extreme pornography have been processed, the researchers said.

"There are assumptions that one of the people behind the credit card processor company also serves as one of the Fethard's owners," Feike Hacquebord, an advanced threat researcher at TrendLabs, reported in a blog post.

"In 2007, a large sum of money was stolen from Fethard's funds. This has undoubtedly created problems for Fethard and has possibly pulled the mother company deeper into the cyber crime business."

Despite the links to illicit activities, the company also carries out legitimate business, with official headquarters located in Amsterdam and a number of customers in Russia as well, Hacquebord said.

"This hacking incident would probably make a lot of cyber criminals nervous. Unfortunately, the incident also puts the personal data of legitimate customers and of many ordinary Russians at risk," Hacquebord added.

No motivation for the compromise has been forthcoming, although a rival gang could be behind the attack, or ethical hackers looking to make their mark.

Featured Resources

Virtual desktops and apps for dummies

An easy guide to virtual desktop infrastructure, end-user computing, and more

Download now

The total economic impact of optimising and managing your hybrid multi-cloud

Cost savings and business benefits of accelerating the cloud journey

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

What’s next for the education sector?

A new learning experience

Download now

Recommended

Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
Russian spy chief rebuffs “pathetic” SolarWinds hack accusations
cyber attacks

Russian spy chief rebuffs “pathetic” SolarWinds hack accusations

18 May 2021
Data breaches increase by a third as staff continue to work from home
cyber security

Data breaches increase by a third as staff continue to work from home

17 May 2021
What is phishing?
phishing

What is phishing?

17 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021