Friday , March 28 2025
1 million

B1ack’s Stash Releases 1 Million Credit Cards on a Deep Web Forum

On February 19, 2025, the illegal marketplace B1ack’s Stash released over 1 million unique stolen credit and debit card details for free. This approach mirrors the strategy used by BidenCash, where criminals distribute stolen data widely to attract attention to their marketplace.

On February 17, a popular deep web forum announced the release of 4 million free credit cards. The upload included 6 archives containing 1,018,014 unique cards, with 192,174 issued by European banks.

OpenAI Offering $100K Bounties for Critical Vulns

OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
OpenAI Offering $100K Bounties for Critical Vulns

Splunk Alert User RCE and Data Leak Vulns

Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
Splunk Alert User RCE and Data Leak Vulns

CIRT alert Situational Awareness for Eid Holidays

As the Eid holidays near, cybercriminals may try to take advantage of weakened security during this time. The CTI unit...
Read More
CIRT alert Situational Awareness for Eid Holidays

Cyberattack on Malaysian airports: PM rejected $10 million ransom

Operations at Kuala Lumpur International Airport (KLIA) were unaffected by a cyber attack in which hackers demanded US$10 million (S$13.4...
Read More
Cyberattack on Malaysian airports: PM rejected $10 million ransom

Micropatches released for Windows zero-day leaking NTLM hashes

Unofficial patches are available for a new Windows zero-day vulnerability that allows remote attackers to steal NTLM credentials by deceiving...
Read More
Micropatches released for Windows zero-day leaking NTLM hashes

VMware Patches Authentication Bypass Flaw in Windows Tool

On Tuesday, VMware issued an urgent fix for a security flaw in its VMware Tools for Windows. CVE-2025-22230 allows a...
Read More
VMware Patches Authentication Bypass Flaw in Windows Tool

IngressNightmare
Over 40% of cloud environments are vulnerable to RCE

Kubernetes users of the Ingress NGINX Controller are advised to fix four newly found remote code execution ( RCE) vulnerabilities,...
Read More
IngressNightmare  Over 40% of cloud environments are vulnerable to RCE

(CVE-2025-29927)
Urgently Patch Your Next.js for Authorization Bypass

Next.js, a widely used React framework for building full-stack web applications, has fixed a serious security vulnerability. Used by many...
Read More
(CVE-2025-29927)  Urgently Patch Your Next.js for Authorization Bypass

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud servers. The stolen data includes...
Read More
Oracle refutes breach after hacker claims 6 million data theft

Russian zero-day seller to offer up to $4 million for Telegram exploits

Operation Zero, a Russian zero-day broker, is offering up to $4 million for Telegram exploits. They seek $500K for one-click...
Read More
Russian zero-day seller to offer up to $4 million for Telegram exploits

Analysis of the Released Data:

The leaked data contains highly sensitive information, including:

Source: d3lab

Credit/debit card number, expiration date, CVV2, cardholder’s personal details (name, address, date of birth, phone number), email address, and IP address used in the transaction

Source of the Data Leak: Web Skimming

The analysis suggests that the data was likely stolen through Web Skimming, which involves adding malicious JavaScript to compromised e-commerce payment pages to capture sensitive user information in real-time.

User-Agent and IP address data suggest that a web skimmer was used to steal information.

Inside the B1ack’s Stash Marketplace:

The B1ack’s Stash marketplace used a free card release to attract new users. After this initial drop, additional cards were sold for about $25 each.

Cards are categorized as credit, debit, or prepaid, and sorted by country and bank. The dumps contain magnetic stripe data that criminals can use to create cloned cards.

Risks and Implications:

The public release of such detailed data significantly increases the risk of:

Financial fraud: Direct use of stolen cards for online purchases.
Identity theft: Personal data can be exploited for further illicit activities.
Targeted phishing: Email addresses and phone numbers can be used for sophisticated phishing campaigns.

Recommendations:

For financial institutions and end-users:

Banks and issuers should closely monitor compromised cards and quickly inform affected customers. Online merchants need to secure their payment systems against Web Skimmers. Users should regularly review their bank statements and report any suspicious activity right away.

This data breach shows the urgent need for proactive cybersecurity, especially in online payment systems. Web skimming is a major threat to e-commerce and credit card users.

Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

Check Also

million

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud …

Leave a Reply

Your email address will not be published. Required fields are marked *