遮罩层
修改话题
  • 首页
  • 出海导航
  • 出海岛群
  • 出海服务
  • 出海榜单
  • APP下载
  • 中文站
印度尼西亚电商
印度尼西亚电商介绍,出海印度尼西亚电商指南
66 14510160
关注
分享

国际刑警组织对虚拟电子商务信用卡窃取者的镇压导致印度尼西亚三人被捕! |出海印度尼西亚电商岛群第36期

2020-02-08 19:42:38

查看 11697 回复 0


登蓝船www.zgchdh.cn,线上助力全球企业的海外市场开拓。
免费对接出海相关需求或资源,请添加官方微信号:BlueBoat_Global


寻求印尼电商货源、印尼电商卖家、入驻印尼电商平台、印尼物流、印尼仓储、印尼推广、参与印尼电商考察、报名印尼电商活动等,请联系蓝船商务微信BlueBoat_Global

欢迎转发此文章到微信朋友圈或电商相关社群,添加蓝船商务微信BlueBoat_Global,均可领取印尼电商报告一份。



             

 

在国际刑警组织支持的针对JavaScript嗅探器的行动之后,三名网络罪犯在印度尼西亚被捕,这是一种恶意软件,用于“掠取”信用卡和来自电子商务网站的其他客户信息。

 

JavaScript嗅探器的工作方式与安装在ATM机和销售点付款系统上的物理撇取设备的工作方式几乎相同。

 

通过将恶意的JavaScript嗅探脚本注入到不安全的电子商务网站的付款结帐页面中,黑客可以在客户将信用卡和个人信息输入到远程服务器之前,先将其掠过。

 

被盗的数据通常包括客户的支付卡详细信息以及诸如姓名,地址和电话号码之类的个人信息,然后可以在非法的暗网市场上批量出售给买家,或用于进行购买。

 

在在线安全公司Group-IB的支持下进行的一项操作中,国际刑警组织能够确定恶意软件构成的威胁范围,并确定全球数百个受感染的电子商务平台。

 

作为Night Night Fury行动的一部分,国际刑警组织的东盟网络能力咨询台向一些活跃于JavaScript嗅探器的国家提供情报。

 

Group-IB提供的数据和情报帮助Interpol在东盟地区的六个国家/地区识别与JavaScript嗅探器和受感染网站相关的C2服务器。

 

这导致三名涉嫌在印度尼西亚运行C2服务器的人被拘留。

 

据称,这些女在将其转售以牟利之前,曾使用失窃的支付卡详细信息购买了电器和其他奢侈品。

 

Night Fury行动还导致在新加坡识别并拆除了两台C2服务器。

 

国际刑警组织网络犯罪总监克雷格·琼斯在一份声明中说:“警察与网络安全行业之间建立牢固有效的伙伴关系对于确保全球执法机构能够获取他们所需的信息以解决当今网络威胁的规模和复杂性至关重要。景观。

 

“这项成功的行动只是执法机构与行业合作伙伴合作,调整和应用新技术以协助调查并最终减少网络犯罪对全球影响的一个例子。”

 

国际刑警组织说,这项行动导致在一些东盟国家建立了许多正在进行的调查,并指出它将继续支持警察寻找C2服务器和受感染的网站。

 

安全专家已经对JavaScript嗅探器带来的威胁表示了一段时间的关注,并指出它们很难被检测到,并且可以被黑客以低至250美元的价格购买。



印尼电商活动分享报名

       66666666666666.png      



Interpol-backed crackdown on virtual ecommerce credit card skimmers results in three arrests in Indonesia

 

Three cyber criminals have been arrested in Indonesia following an Interpol-backed operation targeting JavaScript sniffers, a form of malware that is used to “skim” credit card and other customer information from ecommerce websites.

 

JavaScript sniffers work in much the same way as physical skimming devices fitted to ATM machines and point-of-sale payment systems.

 

By injecting a malicious JavaScript sniffer script into the payment checkout pages of insecure ecommerce websites, hackers are able to skim credit card and personal information as they are entered by customers before sending these to a remote server.

 

The stolen data, which typically includes customers’ payment card details and personal information such as names, addresses and phone numbers, can then be sold on in bulk to buyers on illicit dark web marketplaces, or used to make purchases.

 

During an operation conducted with the support of online security firm Group-IB, Interpol was able to establish the scope of the threat posed by the malware, and identify hundreds of infected ecommerce platforms across the globe.

 

As part of Operation Night Fury, Interpol’s ASEAN Cyber Capability Desk provided intelligence to several countries in which JavaScript-sniffer hackers were thought to be active.

 

Data and intelligence provided by Group-IB helped Interpol identify C2 servers associated with JavaScript sniffers and infected websites in six countries in the ASEAN region.

 

This led to the detention of three individuals suspected of running C2 servers in Indonesia.

 

The suspets are also alleged to have used stolen payment card details to purchase electrical goods and other luxury items before reselling them at a profit.

 

Operation Night Fury also resulted in the identification and takedown of two C2 servers in Singapore.

 

In a statement, Craig Jones, Interpol Director of Cyber Crime, said: “Strong and effective partnerships between police and the cybersecurity industry are essential to ensure law enforcement worldwide has access to the information they need to address the scale and complexity of today’s cyber threat landscape.

 

“This successful operation is just one example of how law enforcement is working with industry partners, adapting and applying new technologies to aid investigations, and ultimately reduce the global impact of cybercrime.”

 

Interpol said the operation had led to the establishment of a number of ongoing investigations in several ASEAN countries, noting that it is continuing to support police in locating C2 servers and infected websites.

 

Security experts have expressed concern about the threat posed by JavaScript sniffers for some time, noting that they can be difficult to detect and can be bought by hackers for as little as $250.


回复(0)

分享

添加评论

全部评论(0条)



蓝船出海(Blue Boat Global),一个专注于(物)互联网属性公司拓展海外市场的B2B出海服务社区
,致力于成为企业拓展海外市场的B2B出海服务平台。
蓝船出海服务社区有2700+,主要覆盖金融科技、游戏、电商、AI智能、
区块链、海外房产、海外医疗、海外时尚业、海外电子烟、海外旅游业、
海外app、物联网、汽车、海外留学教育、海外KOL等15大领域,为公司
拓展海外市场提供交流与指导。

©2017中国出海导航    沪ICP备17019875号-1,AII Rights Reserved Powered By 蓝船出海 www.zgchdh.cn