Hacker attaccano il sito di BA: a rischio le carte di credito


A me risulta che finché non chiami e blocchi la carta sei tu responsabile, quindi se subisci qualche truffa e non te le accorgi subito è un problema. Certo puoi disconoscere il pagamento e contestarlo e verra aperta un indagine e ben che vada passeranno mesi prima di rivedere i tuoi soldi
Inoltre generalmente gli sms di notifica transazione sono impostati per importi superiori a 50 euro di singola transazione e i truffatori spesso fanno proprio tante singole transazioni di importo inferiore..
 
Dipende dalla banca/circuito cc. In genere, come nel mio caso, puoi impostare il valore oltre il quale ricevere la notifica (anche 0.01 €). Poi, per quanto riguarda il rimborso degli importi disconosciuti anche qui, dipende dall'efficienza della banca. In genere non mi è mai capitato di superare i 2 mesi. Va però fatta denuncia alla polizia/carabinieri, ecc. da allegare alla richiesta. P.S. mi è capitato di subire lo stesso trattamento anche col bancomat e anche in quel caso mi è stato rimborsato tutto.
Alla fine ha ragione TW: no panic. È "solo" una scocciatura.

Inviato dal mio VTR-L09 utilizzando Tapatalk
 
A me è recentemente successo con Amex, per oltre 2500 €: tempo dello storno 1 (un) giorno.
Amex fra l'altro molto efficiente sulle frodi, a me clonarono la carta a Bruxelles alcuni anni fa e provarono ad usare la carta in Russia sotto natale, tipo il 23 dicembre. Bloccarono direttamente il pagamento e il 27 dicembre avevo già la carta sostitutiva a casa.
Altra volta provarono ad acquistare online negli Usa, me ne accorsi dal sms e contattata Amex per verificare e disconoscere la spesa e anche in questo caso spesa tolta dal conto entro 1 giorno e nuova carta arrivata gratuitamente in3-4 giorni.
 
Certo puoi disconoscere il pagamento e contestarlo e verra aperta un indagine e ben che vada passeranno mesi prima di rivedere i tuoi soldi

Se usi un bancomat come mezzo di pagamento può darsi, ma non se usi una carta di credito. Quando usi una carta di credito non stai spendendo i tuoi soldi ma quelli della banca: i soldi restano sul tuo conto corrente finché non ricevi un estratto del conto carta e paghi.

Mi è successo con vari istituti di credito in Italia e USA e mai - ma proprio mai - c'è voluto più di qualche minuto per risolvere il problema. Varie volte una società emittente (banca o Amex) mi ha contattato preventivamente avendo identificato transazioni sospette e - alla mia conferma della loro natura fraudolenta - ha stornato l'importo e disposto l'emissione di una nuova carta.
Una volta ho chiamato Amex Italia per contestare una transazione fraudolenta: non ho fatto nemmeno in tempo a dire quale - l'addetto al telefono mi ha chiesto se fosse quella di Trenitalia. Ho risposto in senso affermativo e il resto della chiamata è servita a confermare l'indirizzo per la spedizione di una nuova carta.
Qua negli USA, un giorno, tornai a casa e mi trovai un pacco UPS contenente $13000 di carte regalo ricaricabili Amex che - ovviamente - non avevo ordinato. Telefonai all'emittente della Visa con la quale le carte erano state acquistate e in 5 minuti mi stornarono gli addebiti emettendo una nuova carta. Unica raccomandazione: "conservi le carte regalo Amex per un anno: Amex le annullerà ma l'FBI potrebbe in teoria contattarla qualora dovesse essere aperta un'indagine. Può capitare per importi così alti".
Sia negli USA che nell'UE la legge impone alle banche di garantire la sicurezza delle carte di credito: non è il consumatore a pagare. Punto.
 
Nuovi dettagli (non buoni) emergono.



BA under pressure as hack details emerge


At least one UK bank eyes compensation from airline, which could also face tough fines

As further details of a British Airways hack that stole financial details of 380,000 customers emerged on Monday, at least one UK high street bank said it is discussing whether there is a way to claim compensation from the company.
BA is also expected to face tougher fines for the hack, which took place during two weeks from August 21 because of sensitive bank card verification codes that were stolen at the time.
Businesses receiving payments are not allowed to store card verification value (CVV) codes, even if they are encrypted, because they make it much easier for cards to be used. “I believe it might be the worst financial data breach of all time in the transportation sector, increasingly chosen as a target of cyber attacks,” said Lukasz Olejnik, cyber security and privacy researcher.
BA said on Monday it did not store CVV codes. This suggests they were scraped as customers keyed them in online, or intercepted when payments were made and the codes sent for authorisation.
High street bank RBS, which has issued replacement cards to tens of thousands of customers, said that because merchants such as BA do not store CVV codes, “this looks like the hack has taken place during the payments process rather than on a database”.
The UK data protection watchdog, which has the power to impose fines of up to 4 per cent of turnover (£500m in BA’s case) for data breaches, considers various factors when deciding a penalty, including “the extent of any exposure to physical, financial or psychological harm”.
Customers whose data were stolen have approached lawyers about legal action, although BA promised compensation in its initial communications.
“This is particularly serious given the CVV leak,” said Sean Humber, partner at law firm Leigh Day. “So it seems to be clear that those who have lost the data will have the right to compensation not just for the financial losses but for non-financial losses.”
Affected customers’ banks have mostly been sending out replacement cards as a matter of course.
Santander pointed out it may be too early for customers to know if any fraud has taken place: “It usually takes a few weeks for bad people to get hold of the stolen data and to use it to try and defraud customers. Replacing the cards mitigates this risk but it does not eliminate it.”
On Friday, the number of calls from RBS customers asking for their cards to be cancelled rose 10-fold, but it has since returned to normal, the bank said, adding that there had been no overall increase in fraud since the hack and it was “too early to tell” if affected customers had suffered higher fraudulent activity than usual.
However, security analysts said it was unusual for CVV data to be compromised. A hack at online travel insurance company Staysure is the most significant recent UK example. In 2013, when hackers accessed the IT systems of US retailer Target, compromising the accounts of more than 40m credit card holders, not all card verification information was leaked. CVV data stored in the magnetic strip was accessed, but the three-digit codes on the back of the card were not. BA has not specified which type of CVV code was accessed.
In the first of two emails to customers, BA said “financial details” had been “compromised”, but it was not until the second email, almost a day later, that it clarified that this included bank card numbers, expiry dates and CVV codes. Both emails advised customers to contact their banks.
Consumer advisers and crisis managers said BA had responded promptly and sensibly to the hack. Kate Bevan, editor of consumer advice publication Which? Computing, said it was good advice from BA, since only the bank would know if money had been taken.
Jerry Allen, managing director of Return on Development, a crisis management consultancy focusing on aviation, said BA’s response was “timely”, with emails signed by chief executive Alex Cruz and offers of compensation: “Ultimately in all my experience of aviation crises, people will largely excuse the incident — what they will not excuse under any circumstances is a poor response.”
However, customers disagreed that BA’s response had been sufficient. Sara Hawkins said that she had been left anxious because of the hack’s “malicious intent”, while Jenna Smith said she had to cancel a credit card used to book several parts of “a long-saved-up-for, major holiday”, which meant she had to change all those bookings too.
Ms Smith said: “I’ve trusted BA for a long time and there seems to be a downward spiral of both their flights and also the security. Where does it end?”

FT
 
British Airways: Suspect code that hacked fliers 'found'

A cyber-security firm has said it found a malicious script injected into the British Airways website, which could be the cause of a recent data breach that affected 380,000 transactions.

A RiskIQ researcher analysed code from BA's website and app around the time when the breach began, in late August.

He claimed to have discovered evidence of a "skimming" script designed to steal financial data from online payment forms.

BA said it was unable to comment.

A very similar attack, dubbed Magecart, affected the Ticketmaster website recently, which RiskIQ said it also analysed in depth.

The company said the code found on the BA site was very similar, but appeared to have been modified to suit the way the airline's site had been designed.

"This particular skimmer is very much attuned to how British Airway's payment page is set up, which tells us that the attackers carefully considered how to target this site instead of blindly injecting the regular Magecart skimmer," the researcher wrote in a report on the findings.

"The infrastructure used in this attack was set up with British Airways in mind and purposely targeted scripts that would blend in with normal payment processing to avoid detection."

Hacks like this make use of an increasingly common phenomenon, in which large websites embed multiple pieces of code from other sources or third-party suppliers.

Such code may be needed to do specific jobs, such as authorise a payment or present ads to the user. But malicious code can be slipped in instead - this is known as a supply chain attack.

In BA's case, hackers stole names, email addresses and credit card details - including the long number, expiry date and the three-digit CVV security code.

"As this is a criminal investigation, we are unable to comment on speculation," said BA in a statement.

A spokesman for the UK's National Crime Agency said it was aware of the RiskIQ report but would not be commenting at this time.

Data grab

RiskIQ said the malicious script consisted of just 22 lines of code. It worked by grabbing data from BA's online payment form and then sending it to the hackers' server once a customer hit the "submit" button.

The cyber-security firm added that the attackers had apparently been able to gather data from mobile app users as well because the same script was found loaded into the app on a page describing government taxes and carrier charges.

"The page [in the app] is built with the same... components as the real website, meaning design and functionality-wise, it's a total match," the RiskIQ report noted.

RiskIQ recommended that BA customers affected by the breach get a new debit or credit card from their bank.

The firm pointed out that whoever was behind the attack had apparently decided to target specific brands and that more breaches of a similar nature were likely.

"There is a very clear emerging risk where the weakest link in payment processes is being actively targeted," cyber-security expert Kevin Beaumont told the BBC.

"And that weakest link in the chain is often by placing older systems or third-party code into the payment chain."

Andrew Dwyer, a cyber-security researcher at the University of Oxford added that the attackers appeared to have gone to "extraordinary lengths" to tailor their code to the BA site.

According to RiskIQ, they also acquired a Secure Socket Layer (SSL) certificate - which suggests to web browsers, not always accurately, that a web page is safe to use.

If this was indeed how the attack worked, he added, there are ways of preventing third-party code taking data from sensitive web pages.

"BA should have been able to see this," he told the BBC.
https://www.bbc.co.uk/news/technology-45481976
 
Sara Hawkins said that she had been left anxious because of the hack’s “malicious intent”, while Jenna Smith said she had to cancel a credit card used to book several parts of “a long-saved-up-for, major holiday”, which meant she had to change all those bookings too.
Ms Smith said: “I’ve trusted BA for a long time and there seems to be a downward spiral of both their flights and also the security. Where does it end?”

FT


Figurati se non ci piazzavano la preoccupata di turno a causa del "malicious intent" - ma dai?!?! - per spese fraudolente che alla peggio ti rimborsano al 100 %.
Oppure la classica "major holiday" della persona che-ha-risparmiato-da-tanto-tempo-per-quella-vacanza

L'hai preso per caso dal Daily Mail?
 
Figurati se non ci piazzavano la preoccupata di turno a causa del "malicious intent" - ma dai?!?! - per spese fraudolente che alla peggio ti rimborsano al 100 %.
Oppure la classica "major holiday" della persona che-ha-risparmiato-da-tanto-tempo-per-quella-vacanza

L'hai preso per caso dal Daily Mail?
Dal FT
 
Nuovi, ulteriori sviluppi. Newsletter interna.

BA data theft linked to Russian group
The Times and several other newspapers write that the British Airways hack is believed to have been carried out by a group linked to Russia that also pulled off a similar raid on Ticketmaster. Security researchers at the company Risk IQ said that to steal the payment details of 380,000 customers, the “Magecart” group” set up custom built, targeted infrastructure to blend in with the BA website specifically and avoid detection for as long as possible. The Times suggests Risk IQ Magecart injects surreptitious code designed to steal the sensitive data that customers enter on retailers’ online payment forms — either compromising the retailers directly or through third-party suppliers of payment services. Magecart operatives placed one of these digital “skimmers” on Ticketmaster websites through a compromised third-party company. Anthony Glees, of the University of Buckingham, said: “Security firms have concluded that there is a high probability that a Russian organisation is behind Magecart. The Russian connection matters not only because if the money flows there, there is little we can do about it, but because the nexus of Kremlin and serious organised crime shows there could be a political or strategic use of this kind of fraud. We know, or we believe we know, that Russia has every interest in fomenting chaos in the UK and other western states.” British Airways said it could not comment on speculation surrounding the data theft as it was a criminal investigation. Writing about how the theft would affect British Airways’ reputation, City AM said that the speed and efficiency in which a brand is seen to have addressed and dealt with the problem will have an effect on how lasting the impact is – and BA boss Cruz was quick to apologise and reassure customers within 24 hours of the news breaking. Writing in her column in the Daily Express, Anne Widdecombe says she has sympathy for people who have been affected by this, but stipulates that: “BA is also a victim of this nasty scam and hardly deserves the abuse being hurled in its direction.” She advises former Apprentice contestant Michelle Dewberry, who has criticised the airline while on holiday in Vietnam, to look around her, see how the locals live and feel humbled.
Read more at BBC News>>
 
Mi devono sostituire la carta di credito. Grazie Biella

Inviato dal mio SM-G935F utilizzando Tapatalk
 
gombloddo gombloddo. E' infatti tutta colpa del GCHQ che, dopo aver spiato su Trump, arrubbato il Novichok dalla Russia ed averlo usato contro Skripal, ora ha preso la carta di credito di AAmilan e la usera' per comprare settordicimila eggs benedict dal baretto sotto casa.
 
Le ultime notizie dicono che l’hacking sia avvenuto in estremo oriente: è stato inserito un malware che leggeva e faceva screengrab dei dati mentre questi venivano inseriti dall’utente di turno, dati che venivano poi trasmessi ad un server in Europa dell’est. Sembra che BA si sia accorta abbastanza velocemente della cosa (un noto motore di ricerca sembra ci abbia impiegato 5 mesi…), e che il tutto sia stato scoperto grazie ad un cliente BA che si è accorto di strani accessi alle proprie carte di credito ed abbia allertato la compagnia.

I clienti interessati dovrebbero essere circa 150.000 ma, per scrupolo, BA ne ha allertati più del doppio e, per accelerare la diffusione della notizia, ha prima divulgato l’informazione alla stampa e poi cominciato a trasmettere le mail.

Al momento non ci sono notizie di attività fraudolente con i dati delle carte rubate, ed il sospetto degli investigatori è che si sia trattato di operazione in conto terzi, per vendere le carte sul dark web.
 
Ultima modifica da un moderatore: