Chinese smartphone manufacturer OnePlus confirmed that its online payment system was compromised in a credit card breach. This follows complaints of fraudulent credit card transactions reported by customers who made purchases on the company’s official website, oneplus.net. The data breach compromised the information of 40,000 users who entered their data on the website between mid-November 2017 and January 11, 2018.
During an investigation, OnePlus found a malicious script in the code of the site’s payment page that stole entered information. However, it is not yet clear how hackers broke into the site. Breached information included full credit card information, card numbers, expiry dates, and security codes. OnePlus has since removed the script, quarantined the infected server , and reinforced relevant system infrastructure.
The breach did not affect users who paid using PayPal and through a “Credit Card via PayPal” option. For now, OnePlus has temporarily disabled its credit card payments, but transactions made through PayPal are still accepted. Meanwhile, OnePlus has contacted potentially affected users via email and advised users to report fraudulent charges in card statements to their banks.
Data breaches such as the OnePlus incident places private records and other sensitive data at risk of being stolen. It affects not just the organization, but also those whose personal information may have been stolen. Cybercriminals can do this by physically accessing a computer network to steal local files, or by bypassing network security remotely.
Here are some things you can do if you fear your information was part of a data breach:
Notify your bank. Verify account details and change PIN codes and account passwords.
Double check email addresses from incoming emails. Cybercriminals can pose as bank representatives and ask for credentials.
Avoid clicking any suspicious links or download files from unknown sources.
If your credentials or financials have been tampered with, contact the breached company and ask if they offer credit monitoring or identity theft protection services for affected customers.
Trend Micro Solutions
Trend Micro™ Deep Discovery™ provides detection, in-depth analysis, and proactive response to attacks using exploits and other similar threats through specialized engines, custom sandboxing, and seamless correlation across the entire attack lifecycle, allowing it to detect these kinds of attacks even without any engine or pattern update. These solutions are powered by XGen™ security, which provides a cross-generational blend of threat defense techniques against a full range of threats for data centers, cloud environments, networks, and endpoints. Smart, optimized, and connected, XGen™ powers Trend Micro’s suite of security solutions: Hybrid Cloud Security, User Protection, and Network Defense.
Like it? Add this infographic to your site: 1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).