Cybercriminals siphon credit card numbers from Oregon Zoo website

Avatar

Cybercriminals were able to steal the credit card information of more than 100,000 people this year after taking over parts of a website run by the Oregon Zoo.

The Portland-based zoo filed documents with regulators on Friday that outlined a months-long campaign against the payment platform the organization uses on its website. 

In late June, zoo officials discovered suspicious activity within the online ticketing service and decommissioned the website to begin an investigation. 

By July 22, the zoo learned that “an unauthorized actor redirected customers’ transactions from the third-party vendor who processed online ticket purchases, potentially obtaining payment card information from December 20, 2023, to June 26, 2024.” 

“As a precaution, Oregon Zoo reviewed all transactions from this period to identify anyone whose payment card information may have been affected,” the zoo said. “The personal information that could have been subject to unauthorized access includes name, payment card number, CVV and expiration date.”

The Oregon Zoo told regulators in Maine that 117,815 people were affected in total. 

Federal law enforcement agencies were notified of the incident and Oregon Zoo is providing all victims with one year of credit monitoring services. 

The zoo filed breach notifications with regulators in Oregon and Texas as well. The Oregon Zoo is the latest major zoological organization to face attack by cybercriminals after the Toronto Zoo and Tampa Bay Zoo both dealt with incidents over the last 12 months. 

Payment-skimming malware infections have been a tried and true method for cybercriminals to earn money for years. In skimming attacks, hackers embed tools or malware onto e-commerce sites that allow them to siphon credit card information from online stores during the checkout process. The tactic has long been a problem for popular internet sellers.

In December, Europol joined law enforcement agencies from 17 countries in warning 443 online sellers that the payment card data of their customers had been compromised through e-skimmers.

In July 2024 alone, Recorded Future found 3,799 e-commerce domains suffered an e-skimmer infection

Threat actors posted 18.6 million card records for sale on dark web carding shops in July, with researchers collecting “8.8 million freely posted full card data records in July 2024.”

The payment fraud industry has shown signs of recovery following Russian law enforcement’s crackdown on domestic cybercriminals and the Russian invasion of Ukraine, according to an annual payment fraud report from Recorded Future. The Record is an editorially independent unit of Recorded Future.

Researchers found 119 million cards posted for sale on dark web carding shops, with an estimated $9.4 billion in preventable fraud losses for card issuers and $35 billion in potential chargeback fees for merchants and acquirers in 2023.

In 2022, researchers said e-skimmers led to 45.6 million compromised payment card records posted for sale on dark web platforms.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Columbus officials warn victims, witnesses after ransomware leak of prosecutor files

Next Post

Vulnerabilities in Microsoft’s macOS apps could help hackers access microphones and cameras

Related Posts

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published Thursday, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE-2025-31324 (CVSS score: 10.0) since April 29, 2025. CVE-2025-31324 refers to a critical SAP NetWeaver flaw
Avatar
Read More

Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly security updates for Android with fixes for 46 security flaws, including one vulnerability that it said has been exploited in the wild. The vulnerability in question is CVE-2025-27363 (CVSS score: 8.1), a high-severity flaw in the System component that could lead to local code execution without requiring any additional execution privileges. "The most severe of
Avatar
Read More

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that's based on Apache Airflow. "This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their access to the default Cloud Build service account, which
Avatar
Read More