Huge Cache of Pakistani Payment Card Data Appears on Dark Web

Posted on Posted inBE2C2

LONDON — A huge dump of cards and PIN codes from Pakistani banks has gone up for sale on notorious Dark Web site Joker’s Stash, reports UK based Finextra Research Limited.

Threat intelligence Moscow-based firm Group-IB uncovered the new database said the report, which holds a total of 69,189 Pakistani banks’ cards with a street value of approximately $3.5 million.

The Joker’s Stash site is offloading the cards – 96% of which originated from Meezan Bank – for $50 per card. The premium price reflect the capture of the PIN card and mag-stripe data for making cloned cards.

The bank’s top official, however, told The News the customers’ data is safe. “I have checked there is nothing alarming and Meezan Bank has already taken safety steps and measures to safeguard its customers and card holders,” the official added. “Our customer data is safe and secured.”

The dump is the second big download of stolen card data from the Pakistani banking community over the past three months.

In November 2018, Group-IB reported about massive leaks of 177,878 payment cards of Pakistani and other international banks. The banks affected by this breach included major Pakistani banks financial organizations such as, Habib Bank, MCB Bank Limited, Allied Bank Limited and many others.

The Federal Investigation Agency (FIA) in November confirmed that customer card data from nearly all of Pakistan’s major banks had been stolen in an unspecified cyberattack.

Last year, Group-IB ascertained two incidences of payment cards’ data theft that affected Pakistan banks, including Habib Bank, MCB Bank, Allied Bank and BankIslami.

The State bank of Pakistan earlier raised question over the credibility of the Group-IB report’s revaluations about Pakistan’s bank’s data breach. The central bank has, however, been instructing banks in the past to upgrade their systems to meet any cyber attack challenge in future.

Leave a Reply

Your email address will not be published. Required fields are marked *