Categories: Cyber Crime

Electronic Payment Service Cash Anywhere Publicly Admits to Security Breach

Shockingly, for the last five years, hackers have been using a banking malware to siphon unencrypted credit/debit card information from the computer networks of Charge Anywhere, an electronic payment service used by millions of merchants worldwide.

Charge Anywhere, an electronic payment service provider to merchant publicly admitted to a security breach that may have compromise the account details of all customer who used its service for the last five years. Apparently, hackers installed a data stealing malware which have been harvesting card information from the company’s computer network.

In a statement to news media, Charge Anywhere said the clandestine mission has been ongoing since November 2009 until early September 2014 when it was unearthed.

“The investigation revealed that an unauthorized person initially gained access to the network and installed sophisticated malware that was then used to create the ability to capture segments of outbound network traffic,” the release stated.

A forensic analysis of the malware revealed that the attackers were able intercept unencrypted transaction data from Charge Anywhere’s computer network.

Much of the outbound traffic was encrypted. However, the format and method of connection for certain outbound messages enabled the unauthorized person to capture and ultimately then gain access to plain text payment card transaction authorization requests.” Reads the statement.

The extent and full capabilities of the unearthed malware is still not clear but Charge Anywhere has enough evidence to believe, the attackers were able to captures cardholders’ transactional authorization details, including cardholder name, account number, expiration date, and transaction verification code.

Charge Anywhere is urging merchants to counter check their names against a provided list of potentially affected merchants “Payment cards used at these merchants between November 5, 2009 and September 24, 2014 may have been affected although we only found evidence of actual network traffic capture from August 17, 2014 through September 24, 2014,” noted the company.

Individual shoppers to the affected merchant should continually monitor their banks statement for any peculiar transactions. Contact your bank immediately in case you notice unauthorized transaction in your bank statement within the Last five years, advises Charge Anywhere. Ideally, card companies’ cushion cardholders against money losses from unauthorized transaction in their accounts.

Charge Anywhere has assured merchant the malware has been “completely eradicated” and it is highly unlikely that Point of sales systems of individual merchants were implicated in the syndicate. Furthermore, the company has forwarded the listed of potentially affected Merchants to banks and Card companies to help in tracking and monitoring their accounts.

More importantly, the company is urging shoppers and Merchants to remain vigilant by frequently reviewing their bank statements and credit reports for unauthorized transactions. Notably, shoppers are advised to regularly collect their credit reports from their card providers at least once every year.

Recently, the world had seen an upsurge of banking malware targeting credit/debit card data. Hackers are increasingly using advanced Point of Sale (POS) RAM scrappers to tap into the computer networks of retailers and steal customers’ card information, which is later used to swipe clean their bank accounts. Data breaches at large retail stores such as the Target and Home Depo clearly shows the imminent threat posed by these sophisticated POS malwares such as the BlackPOS or the Getmypass malware discovered a few days ago.

Security experts believed the deep rooted infiltration of Charge Anywhere network is an indication that hackers are getting more sophisticated and stealthier. The FBI and the Department of Homeland security have advised shoppers to watch out for an increasing number of holiday scams. As a rule of thumbs never make a purchase from an untrusted store no matter the discount.

Pierluigi Paganini

(Security Affairs –  cybercrime, Electronic Payment)

Written by: Ali Qamar, Founder/Chief Editor at SecurityGladiators.com

Author Bio:
Ali Qamar is an Internet security research enthusiast who enjoys “deep” research to dig out modern discoveries in the security industry. He is the founder and chief editor at SecurityGladiators.com, an ultimate source for cyber security. To be frank and honest, Ali started working online as a freelancer and still shares the knowledge for a living. He is passionate about sharing the knowledge with people, and always try to give only the best. Follow Ali on Twitter @AliQammar57

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

18 mins ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

11 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

18 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

18 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

23 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

1 day ago

This website uses cookies.