{"id":464,"date":"2003-11-06T00:00:00","date_gmt":"2003-11-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/06\/hackers-in-attack-on-scottish-credit-card-firm\/"},"modified":"2021-12-30T11:37:23","modified_gmt":"2021-12-30T11:37:23","slug":"hackers-in-attack-on-scottish-credit-card-firm","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/06\/hackers-in-attack-on-scottish-credit-card-firm\/","title":{"rendered":"Hackers in attack on Scottish credit card firm"},"content":{"rendered":"<p>Computer hackers have attacked a company that processes online credit and debit card transactions for thousands of UK businesses, it has emerged.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WorldPay, which is part of Edinburgh-based Royal Bank of Scotland Group, said it had been bombarded with millions of bogus e-mails in the past couple of days, which had left the firm struggling to deal with genuine payments.<\/p>\n<p>The bulk of its clients are located in the UK and mainland Europe, and payment requests from websites are normally sent in via e-mail.<\/p>\n<p>The firm said a massive number of messages from elsewhere had come in to the same address over a 24-hour period.<\/p>\n<p>As a result, transaction requests have either crashed or been slowed down.<\/p>\n<p>However, it appears those behind the e-mails &#8211; which originate in the Ukraine &#8211; have set out to disrupt business rather than attempt to commit fraud.<\/p>\n<p>At the start of this year, Visa and Mastercard admitted a hacker had gained access to more than five million credit card accounts.<\/p>\n<p>More recently, net provider PSINet and security firm PanSec International said an unprotected website they set up as part of a study was attacked about 2000 times a week over a two-month period.<\/p>\n<p>More info: [url=http:\/\/www.edinburghnews.com\/business.cfm?id=1224512003]http:\/\/www.edinburghnews.com\/business.cfm?id=1224512003[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-464","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=464"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/464\/revisions"}],"predecessor-version":[{"id":2951,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/464\/revisions\/2951"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}