Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


New Trojan malware campaign sends users to fake banking site that looks just like the real thing

Trickbot malware redirects to counterfeit site that displays the correct URL and the digital certificate of the genuine alternative.

New Trojan malware campaign sends users to fake banking site that looks just like the real thing

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: InterContinental Data Breach Expands from 12 Hotels to Thousands  (Read 20 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 22514
  • .: Surf Queen
    • WWW
InterContinental Data Breach Expands from 12 Hotels to Thousands
19 April 2017, 10:32 pm

The data breach that affected the InterContinental Hotels Group a while back is far worse than originally thought, affecting thousands and thousands of visitors. 

Back in February, InterContinental Hotels Group (IHG) announced they had suffered a data breach in late December 2016. Originally, they said it was a minor problem, having impacted only 12 IHG-managed properties. 

Soon after, IHG called for help from cybersecurity professionals to sort out the mess. Their findings indicate a much deeper and worse problem. Attackers had apparently been able to install malware on the servers handling the payment card processing. This resulted in attackers gathering loads of data like cardholder names, card numbers, internal verification codes, which enabled them to clone cards and make fraudulent payments. 

Customers had been... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks