New virus attacks when you swipe your debit card

January 19, 2014

Virus_attacks_debit_cardNew Delhi, Jan 19: Cyber security sleuths have detected a "black" private information stealing virus in the Indian online banking transactions space and have alerted consumers who swipe debit or credit cards at shopping counters to make payments.

The "severely" spreading virus of the Trojan family has been detected conducting its clandestine operations at the Point of Sale (POS) counters placed at retail terminals after the RBI made it mandatory in December last year for debit cards holders to punch in their PIN every time they make a purchase.

The virus named "Dexter, black POS, memory dump and grabber" can acquire seven aliases when infecting a system and once it is successful in breaching the security protocols of a POS terminal, it steals confidential data like card holder's name, account number, expiration date, CVV code and other discretionary information which could lead to financially compromising and phishing attacks on the card at a later stage.

"It has been reported that malware campaigns targeting payment card processing, point-of-sale (POS), check out systems or equipment are on the rise.

"The common infection vectors for POS system malwares includes phishing emails or social engineering techniques to deliver the malware, use of default or weak credentials, unauthorised access, open wireless networks along with the methods of installing malware as a part of service," a latest advisory issued to the public by the Computer Emergency Response Team (CERT-India) said.

The CERT-In is the nodal department to protect Indian cyberspace and software base infrastructure against any destructive and hacking activities.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
coastaldigest.com news network
May 14,2020

New Delhi, May 14: The National Investigation Agency (NIA) probing the Al-Hind Islamic State (IS) Bengaluru module case has announced a cash reward of Rs three lakh for wanted absconder Abdul Mateen Taahaa.

An NIA spokesperson in Delhi said, "We have declared a cash reward of Rs three lakh for providing any information leading to arrest of Taahaa." The spokesperson said that Taahaa, 26, a resident of Shimoga in Karnataka is wanted in Al-Hind ISIS Bengaluru module case that the agency registered this year. The NIA had taken over the probe from the Karnataka Police.

According to the NIA officials, the case relates to ISIS-linked terror group formed by arrested accused Mehboob Pasha, along with accused Khaja Moideen aka Jalal and his associates involved in the murder of a Hindu leader in Tamil Nadu. The official said that Pasha conducted several meetings in 2019 at his residence in Bengaluru to hatch the conspiracy, by radicalising and recruiting other co-accused to carry out terror activities and join ISIS in Afghanistan or Syria.

The NIA has arrested 12 accused namely Pasha, Imran aka Imran Khan, Mohammed Haneef Khan, Mohammed Mansoor Ali Khan, Saleem Khan aka Kolar Saleem, Hussain Sharieff, Ejaz Pasha aka Azaz Pasha, Zabiulla, Syed Azmathulla, Syed Fasiur Rehman, Mohammed Zaid and Sadiq Basha.

The official said that Taahaa is a friend of arrested accused Saleem and Zaid, through whom he contacted arrested accused Pasha of Al-Hind Trust and was also associated with his online foreign handler.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
coastaldigest.com news network
February 16,2020

Udupi, Feb 16: A man, who was trapped in 15-feet-deep hole following a landslide during borwell digging work at a remote area in the coastal district, was finally rescued after a prolonged effort today.

The man, identified as Rohit, suffered minor injuries in the incident.

The incident took place at Maravanthe village near Baindur in Udupi district.

Rohit was trapped when the land around borewell was being dug collapsed suddenly. It took around six hours for the rescue workers to rescue him.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
coastaldigest news network
March 25,2020

Mangaluru, Mar 25: In the wake of coronavirus outbreak, Nalin Kumar Kateel, Member of Parliament today declared that the coastal city of Mangaluru will remain completely shut tomorrow, (March 26) onwards.

"Today the people were given time to go out of their houses to buy essentials today. But from tomorrow, this will not be allowed," the MP said. 

"We are discussing with officials of all departments about ways to manage the situation. Essential things and facilities people need, will be delivered at their doorsteps. We are sorting out how to deliver the items on behalf of the government and mode of delivery of items to apartment complexes," he said.

He said that a large number of patients from Kasaragod had come into the city yesterday. Hence, the district administration has taken a decision, he said.

"Under the present circumstances, the hospitals in the city would not be sufficient for our purpose. So the administration will not allow any vehicles including ambulances into the city. All the ambulances would be blocked from entering Dakshina Kannada district at Talapady border and sent back," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.