Don’t Tie Yourself in Knots Thinking you can Store Payment Card Verification Codes/Values
Card Not Present Security Codes/Values are the 3 and 4 digit printed numbers on your payment cards used to verify card-not-present transactions. PCI...
1 min read
David Gamey : Sep 10, 2020 10:07:00 PM
Many organizations have either undergone or are planning migrations or acceleration of call centers, remote working, and online presence exploiting technologies like VoIP. Criminals are increasingly taking an interest in these channels. An interesting discovery by ESET, Linux based malware targeting soft-switches produced by China based Linknat. Two models are affected the VOS2009 and VOS3000.
This malware steals call detail recording (CDR) metadata from the systems internal MySQL database. At this time it’s believed that the goal of this malware is International Revenue Share Fraud (IRSF).
While this isn’t a VoIP Credit Card Skimmer, it demonstrates that there are skilled bad actors actively exploiting telephony technologies. This development shows why it is important to review all information channels and ensure that they are both secure and compliant.
Card Not Present Security Codes/Values are the 3 and 4 digit printed numbers on your payment cards used to verify card-not-present transactions. PCI...
Executives and managers in organizations preparing for their first onsite PCI security assessment may feel confident that having passed a SOX audit...
Sensitive authentication data, aka SAD, in PCI compliance is data used by the issuers of cards to authorize transactions. Similar to cardholder...