Cyberattack causes credit card readers to malfunction in Israel

Avatar

Devices used across Israel to read credit cards malfunctioned on Sunday due to a suspected cyberattack that disrupted the communications services underpinning them.

Customers at supermarkets and gas stations were reportedly unable to make payments due to the incident, which reports suggest lasted around an hour.

As reported by the Jerusalem Post, the cause was a distributed denial-of-service attack (DDoS) that targeted the payment gateway company Hyp’s CreditGuard product.

The attack disrupted communications between the card terminals and the wider payment system, but was not capable of stealing information or payments.

A spokesperson for Hyp told the Jerusalem Post that it had ruled out a more significant attempt to interfere with its networks and infrastructure.They said the DDoS attack targeted “some of the company’s services and the communication providers connected to us,” but was blocked after being discovered, with the service quickly returning to normal.

It is not clear who was responsible for the attack. The Times of Israel noted that both Channel 12 news and Army Radio had reported that an Iran-linked hacker group claimed responsibility, although no sources were cited.

The incident follows a similar attack in October when the payment firm Sheba was targeted by a DDoS attack. While that attack disrupted payments for roughly three hours, Sheba’s role in the country’s national payment system caused delays in approving debit card payments.

Cyberattacks targeting civilian infrastructure in Israel have increased during the regional conflict following the October 7 terrorist attacks, driven mostly by politically-motivated groups, such as hackers affiliated with Iran and Hezbollah as well as hacktivists.

Attacks caused by these groups have also impacted civilian infrastructure beyond the region. Residents of a remote area on Ireland’s west coast were left without water for two days last year when a pro-Iran hacking group targeted a piece of equipment that the hackers complained was made by the Israeli company Unitronics.

At the time, the U.S. federal government also warned that it was responding to the active exploitation of Unitronics programmable logic controllers (PLCs) used by many organizations in the water sector, including the Municipal Water Authority of Aliquippa.

CybercrimeNewsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Seoul accuses pro-Kremlin hackers of attacking websites over decision to monitor North Korean troops in Ukraine

Next Post

Surge in exploits of zero-day vulnerabilities is ‘new normal’ warns Five Eyes alliance

Related Posts

SafeWallet Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

SafeWallet has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a "highly sophisticated, state-sponsored attack," stating the North Korean threat actors behind the hack took steps to erase traces of the malicious activity in an effort to hamper investigation efforts. The multi-signature (multisig) platform, which has roped in Google Cloud Mandiant to
Avatar
Read More

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said. "This mechanism allows a user application to perform various actions without using system calls," the company said in
Avatar
Read More

Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei Routers

Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc Botnet. The ongoing activity "demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks," Qualys security researcher Shilpesh
Avatar
Read More