Tag Archives: ATM

CIMB Online + Mobile Services Are Down!

CIMB Online Services Up Again, After Going Down For Hours!

CIMB online and mobile banking services are finally up after failing for most of the day! Here is what you need to know!

 

CIMB Online + Mobile Services Down Most Of The Day!

At around 10 AM on Friday, July 1, 2022, CIMB started experiencing issues with their online and mobile banking services.

Some users could not load the CIMB Clicks website completely, while many users complained that they could log in, but were unable to complete any online transactions, like :

  • Interbank GIRO (IBG)
  • Instant transfers
  • DuitNow transfers

Instead, they received error messages like :

Sorry, service is temporarily unavailable. We apologise for the inconvenience caused. [CLK00495]

We’ve encountered an unexpected error. Please try again later. [CLK00507]

[/su_note]

Please enter valid Email or Mobile Number. [CLK00494]

 

CIMB Online Services Up Again, After Going Down For Hours!

This system-wide issue is not only affecting their online banking portals – CIMB Clicks and CIMB BizChannel, but also their Clicks mobile app.

At 4:37 PM, CIMB announced that Interbank GIRO (IBG) transfers were back online, but not DuitNow transfers.

Please be informed that DuitNow To Account (Instant Transfer) is unavailable at the moment. As an alternative, you may perform transaction by using Normal Transfer (IBG). Thank you.

At 5:22 PM, CIMB announced that they resolved their DuitNow services, although many of their BizChannel customers complained that they are still not able to view their statements, or make online transfers.

Their social media team is asking BizChannel users still experiencing problems to contact the BizChannel team at 1300 888 828 or +603 2297 3000 for further assistance.

CIMB ATM and counter services were not affected by this issue, so you can still head over to a nearby CIMB ATM if you need to withdraw money.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Business | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

South Korean Cyberattacks – From Military To ATM

Following a detailed malware analysis, Kaspersky Lab researchers have connected two South Korean cyberattacks affecting their defence agency as well as 60 ATMs and over 2,000 credit cards.

The malicious code and techniques used in both cyberattacks share similarities with earlier cyberattacks widely attributed to the infamous Lazarus group.

At the Kaspersky Lab Palaeontology of Cybersecurity conferenceSeongsu ParkSenior Security Researcher, Global Research & Analysis Team, APAC, detailed how Kaspersky GReAT researchers traced the disparate South Korean cyberattacks and found the similarities that connected them.

Don’t forget to check out the other Kaspersky Palaeontology of Cybersecurity presentations!

 

South Korean Cyberattacks – From Military To ATM

In August 2016, a cyberattack on South Korea’s Ministry of National Defense infected around 3,000 hosts. The Defense Agency reported the incident publically in December 2016, admitting that some confidential information could have been exposed.

Six months later, at least 60 South Korean ATMs, managed by a single local vendor, were compromised with malware. The incident was reported by the Financial Security Institute and, according to the Financial Supervisory Service (FSS), resulted in the theft of the details of 2,500 financial cards and the illegal withdrawal in Taiwan of approximately US$ 2,500 from these accounts.

Kaspersky Lab researched the malware used in the ATM incident and discovered that the machines were attacked with the same malicious code used to hit the Korean Ministry of National Defense in August 2016. Exploring the connection between these attacks and earlier hacks, Kaspersky Lab has found similarities with the DarkSeoul malicious operations, and others, which are attributed to the Lazarus hacking group.

The commonalities include, among other things, the use of the same decryption routines and obfuscation techniques, overlap in command and control infrastructure, and similarities in code.

What Is The Lazarus Group?

Lazarus is an active cybercriminal group believed to be behind a number of massive and devastating cyberattacks worldwide including the Sony Pictures hack in 2014 and the $81 million Bangladesh Bank heist last year.

Preventive Measures

In order to reduce risk, Kaspersky Lab recommends implementing the following security measures:

  • Introduce an enterprise-wide fraud prevention strategy with special sections on ATM and internet banking security. Logical security, physical security of ATMs and fraud prevention measures should be addressed altogether as attacks are becoming more complex.[adrotate group=”2″]
  • Ensure you have a comprehensive, multi-layered security solution in place. For financial organizations, we recommend using specialized solutions with Default Deny and File Integrity Monitor capabilities such as Kaspersky Embedded Systems Security. These solutions can detect any suspicious activity within the payment devices infrastructure. We also recommend implementing network segmentation for ATM or POS devices.
  • Conduct annual security audits and penetration tests. It is better to let professionals find vulnerabilities than to wait for them to be found by cybercriminals.
  • Consider investing in threat intelligence so that you can understand the rapidly evolving and emerging threat landscape and can help your organization and customers to prepare. Find out more at intelreports@kaspersky.com.
  • Train your employees so they can better spot suspicious emails that could be the first stage of an attack.

Don’t forget to check out the other Kaspersky Palaeontology of Cybersecurity presentations!

Next Page > The South Korean Cyberattacks Presentation Slides

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

South Korean Cyberattacks Presentation Slides

Here is the complete set of slides from Seongsu Park’s presentation on the South Korean cyberattacks.

Don’t forget to check out the other Kaspersky Palaeontology of Cybersecurity presentations!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > First Page | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!