Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.
The vishing -- voice phishing -- campaign was discovered by researchers from cybercrime intelligence firm PhishLabs while investigating a recent attack against customers of an unnamed midsize bank.
The bank's customers had received text messages claiming their debit cards had been deactivated and instructing them to call a phone number. An IVR (Interactive Voice Response) system set up at that number asked callers to input their debit card and PIN numbers in order to reactivate the cards, John LaCour, the founder and CEO of PhishLabs said Tuesday in a blog post.
"PhishLabs investigated the attack and uncovered a cache of stolen payment card data belonging to customers of dozens of financial institutions," LaCour said. "Based on analysis of the recovered cache, we estimate the vishing crew responsible for the attack has stolen the data of 250 cards per day in this vishing campaign."
The researchers believe the attacks are being carried out by a group of cybercriminals from Eastern Europe and that they might be running since October 2013, when one of the rogue phone numbers started being used.
"The withdrawal limit on ATM cards are typically $300 per day," LaCour said. "Using the recently investigated attack as an example, $75,000 can be lost each day of the attack if the stolen cards are used in an ATM cash-out operation."
Attackers shouldn't normally be able to clone a card using only the card number and PIN because they cannot obtain the CVV1 (Card Validation Value) or CVC1 (Card Validation Code) that are encoded on the card's magnetic stripe and are typically used for authentication.
"Unfortunately, some card issuers and payment processors do not authenticate the CVV1/CVC1 code," LaCour said. "This allows vishing crews, cash-out gangs and other fraudsters to create payment cards using stolen card data and use those cards to directly withdraw funds."
But even in cases where cloning the card is not possible, cybercriminals can still use card details obtained through vishing to perform card-not-present transactions online or over the phone.
According to LaCour, attackers install their IVR software on hacked servers and route calls to it from compromised VoIP servers. They use free text-to-speech tools to generate the IVR interactive messages and email-to-SMS gateways to send out text messages to thousands of users.
"Targeted companies often encounter difficulties when attempting to mitigate vishing attacks," LaCour said. "It can take weeks for an organization to navigate the structures of telecom providers, carriers, and service providers and effectively shut down the phone numbers used to scam customers."
The PhishLabs blog post includes recommendations for both financial institutions and mobile carriers. These include: making sure CVV1/CVC1 is encoded on cards and validated by payment processors; always calling customers from a phone number that's printed on the back of the card; working with telecom companies to understand their technical and anti-fraud procedures; training customer support personnel to handle vishing reports and putting a response plan in place that involves customer notification.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.