Friday , February 28 2025
fraud

Bangladeshi Social media flooded with unauthorized withdrawals from bank accounts

Bangladeshi Social media posts have raised concerns about unauthorized withdrawals from bank accounts, affecting at least 7 to 8 people who hold dual currency or credit cards. Initial findings suggested two banks are reported to impacted.

Bangladesh Cyber Security Intelligence (BCSI) reported unauthorized transactions made via Facebook Ad Manager, often in small amounts, with one account having 315 transactions. Victims did not receive One-Time Password (OTP) notifications for these transactions.

By 2025, India’s First Semiconductor Chip to be ready

At the Global Investors Summit 2025, Union Minister Ashwini Vaishnaw announced that India’s first indigenous semiconductor chip will be ready...
Read More
By 2025, India’s First Semiconductor Chip to be ready

CVE-2025-20111
Cisco Warns Vulns in Nexus 3000 and 9000 Series Switches

Cisco has warned of a critical vulnerability, CVE-2025-20111, in several Nexus switch models. This flaw could let attackers remotely crash...
Read More
CVE-2025-20111  Cisco Warns Vulns in Nexus 3000 and 9000 Series Switches

CVE-2025-0475 & CVE-2025-0555
GitLab’s High-Risk Flaw, Patch Now Urgently!

GitLab has released a security advisory, urging all self-managed installations to upgrade to versions 17.9.1, 17.8.4, or 17.7.6 due to...
Read More
CVE-2025-0475 & CVE-2025-0555  GitLab’s High-Risk Flaw, Patch Now Urgently!

Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

A China-linked botnet is targeting Microsoft 365 accounts with widespread password spraying attacks, according to a report by SecurityScorecard. A...
Read More
Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

HaveIBeenPwned Added 244 Million Passwords Stolen By Infostealers

A breach notification site has added millions of new passwords and email addresses obtained from infostealer malware. Troy Hunt, founder of...
Read More
HaveIBeenPwned Added 244 Million Passwords Stolen By Infostealers

Hackers Exploits RCE flaw in Cisco Small Business Router

Cybersecurity researchers have discovered a campaign exploiting a remote command execution vulnerability, CVE-2023-20118, in Cisco Small Business Routers. This vulnerability...
Read More
Hackers Exploits RCE flaw in Cisco Small Business Router

CISA Alerts For Active Exploited Zimbra and Microsoft flaw

CISA has added two critical vulnerabilities to its Known Exploited Vulnerabilities catalog, urging organizations to quickly patch their systems to...
Read More
CISA Alerts For Active Exploited Zimbra and Microsoft flaw

200 Fake GitHub Repos Attacking Developers to Deliver Malware

A new cyber campaign called GitVenom poses a serious risk to developers. Security researchers found over 200 fake GitHub repositories...
Read More
200 Fake GitHub Repos Attacking Developers to Deliver Malware

Renew Dubai visa within minutes with AI-powered Salama

Residents of Dubai can now easily renew their visas with the new AI-powered digital platform launched by the General Directorate...
Read More
Renew Dubai visa within minutes with AI-powered Salama

CVE-2024-20953
CISA Flags Oracle Agile PLM Actively Exploited Security Flaw

CVE-2024-20953 is a vulnerability in Oracle Agile PLM, a product lifecycle management tool. With a CVSS score of 8.8, it...
Read More
CVE-2024-20953  CISA Flags Oracle Agile PLM Actively Exploited Security Flaw

The unusual nature of these incidents has caught the attention of the BCSI, is now investigating how these breaches happened without standard security measures like OTP verification.

So what might have happened?

When adding a card for Facebook ad payments, minimal information like the card number, DOB, and CVC/CVV is required. The platform might sometimes ask for a postal code but never for the cardholder’s name. The ease of adding a card without extensive verification leads to vulnerabilities.

For example, if the card’s BIN (Bank Identification Number) is compromised, crackers can generate and use other card numbers sequentially linked to the original BIN. Additionally, transactions through verified international gateways might not prompt an OTP from the bank, assuming it’s a legitimate request, hence bypassing usual security checks. This process, facilitated by tools and unique IP usage by platforms like Facebook, can lead to unauthorized use of your card without detection.

Source: BCSI

What is a BIN Attack?

In a BIN attack, A cybercriminal uses brute force methods to find valid credit card details like the card number, expiration date, and CVV. They utilize a botnet to quickly test many combinations. Once they find a valid set, they may try variations, assuming other cards have the same Bank Identification Number (BIN).

Way to prevent Bin attacks to enhance securit:

BIN attacks occur when fraudsters use the Bank Identification Number to create valid card numbers, but can be reduced through several measures by banks and cardholders. Here BCSI suggest:

Measures to be taken for Banks:

Enhanced Verification: Incorporate advanced security protocols, including biometric authentication and mandatory CVV verification for every transaction.

Limit Number of Attempts: Set a limit on how many times a card number can fail verification before being blocked or flagged.

Advanced Fraud Detection Systems: Utilize AI and machine learning to identify unusual patterns of BIN attacks.

Secure BIN Sharing: Limit shared BIN data with merchants and manage it securely to prevent unauthorized access.

Monitor Transaction Patterns: Regularly monitor transaction patterns for anomalies that may signal a BIN attack, like an unusually high number of declined transactions.

Educate Merchants: Provide training and resources to merchants on identifying and responding to potential BIN attacks.

Measures to be taken for Card Users:

Monitor Account Activity: Check your transaction history often for any suspicious activity and report it right away.

Use Card Security Features: Turn on security options for your card, like temporary numbers for online shopping.

Enable Alerts: Configure transaction notifications through SMS or email to receive updates on any charges made with the card.

Be Cautious Online: Only enter card details on secure, familiar websites. Check for “HTTPS” in the URL as a sign of security.

Report Lost/Stolen Cards Immediately: Promptly notify the bank about any lost or stolen cards to safeguard against unauthorized transactions.

Source: BCSI

(Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means)

Check Also

200 Fake GitHub

200 Fake GitHub Repos Attacking Developers to Deliver Malware

A new cyber campaign called GitVenom poses a serious risk to developers. Security researchers found …

Leave a Reply

Your email address will not be published. Required fields are marked *