DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Computer specialist who had warned Iranian banks about vulnerability, hacks and dumps 3 million accounts to make his point

Posted on April 16, 2012 by Dissent

Is it just me, or have these folks missed the point? From The Tehran Times:

A computer specialist, who used to work for a PSP (payment service provider) company which offers a number of Iranian banks services for accepting electronic payments, has hacked accounts of three million bank customers to show the vulnerability of the banks to computer security threats, the Persian service of the Fars News Agency reported on Sunday.

According to the report, the hacker had provided the managing directors of the targeted banks with information about the bank accounts of 1000 customers in the previous Iranian calendar year (ended on March 19) to warn them about the susceptibility of their computer systems and networks to cyber threats.

The Central Bank of Iran issued a statement on Saturday advising the bank customers to change the passwords of their bank cards to prevent possible credit card fraud.

An official at the Central Bank of Iran also told the Persian service of IRNA on Sunday that no one has illegally accessed people’s bank accounts.

“It is possible that certain individuals have some information… but they cannot use this information until the bank cards are not in their possession,” Nasser Hakimi said.

The deputy chief of Iran’s cyber police, Mohsen Mirbahresi, also said on Sunday that there is no cause for concern because the hacker has not acquired important financial information, such as bank account numbers.

No statement about improving security? Changing passwords isn’t going to do it if the security problems aren’t addressed.

Radio Free Europe and Kabir News identify the hacker as Khosrow Zare Farid, a former manager at Eniak,the operator of Shetab payment network in Iran. According to Kabir News, Farid had previously warned the banks of the problem but got no response and decided to publish the data of 3 million accounts from ten Iranian banks.

I suspect he’s got their attention now.

The Iran Independent News Service reports that ATM’s in the country are no longer dispensing cash and that the only function working is the mode for changing the passwords.

Related posts:

  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Iran vs U.S., The Cyber Front Explained
  • Iran’s ban on Telegram that was intended to facilitate domestic spying backfired
  • Nine Iranians Charged With Conducting Massive Cyber Theft Campaign on Behalf of the Islamic Revolutionary Guard Corps
Category: Breach IncidentsFinancial SectorHackNon-U.S.Of Note

Post navigation

← Duke University Health System notifies patients of breach-that's-not-called-a-breach? (updated)
UK: Briefcase stolen from social worker's home contained details of child protection cases →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit
  • British national “IntelBroker” charged with causing $25 million in damages; U.S. seeks his extradition from France

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.