The information provided on this website does not, and is not intended to, act as legal, financial or credit advice; instead, it is for general informational purposes only. Information on this website may not be current. This website may contain links to other third-party websites. Such links are only for the convenience of the reader, user or browser; we do not recommend or endorse the contents of any third-party sites. Readers of this website should contact their attorney, accountant or credit counselor to obtain advice with respect to their particular situation. No reader, user, or browser of this site should act or not act on the basis of information on this site. Always seek personal legal, financial or credit advice for your relevant jurisdiction. Only your individual attorney or advisor can provide assurances that the information contained herein – and your interpretation of it – is applicable or appropriate to your particular situation. Use of, and access to, this website or any of the links or resources contained within the site do not create an attorney-client or fiduciary relationship between the reader, user, or browser and website owner, authors, contributors, contributing firms, or their respective employers.
Credit.com receives compensation for the financial products and services advertised on this site if our users apply for and sign up for any of them. Compensation is not a factor in the substantive evaluation of any product.
Some of the largest and best-known banks in the country were recently targeted by hacking attacks that crippled their websites, and experts say these could be the biggest attacks ever.
In the days since Sept. 19, the websites for Bank of America, JPMorgan Chase, Wells Fargo, U.S. Bank and PNC Bank have all been hit by what are known as denial of service attacks that brought the online destinations to a standstill, according to a report from CNNMoney. Security experts say that these attacks would have taken large amounts of coordination and resources, and are therefore the largest of their kind ever.
“The volume of traffic sent to these sites is frankly unprecedented,” Dmitri Alperovitch, co-founder of the security firm CrowdStrike, told the news site. “It’s 10 to 20 times the volume that we normally see, and twice the previous record for a denial of service attack.”
It’s believed that the hackers responsible for these attacks would have had to use thousands of servers and directly targeted each bank individually, the report said. Each bank was targeted in sequence, beginning with Bank of America and Chase on the first day. These attacks were so effective, in fact, that PNC says that even a day later, they were still affecting some users’ ability to access to its site.
Further, experts say that the hackers likely had to set up massive “botnet” servers that essentially used malware to hijack other servers and make them all work in concert to bring down the targeted sites, the report said. That may be an indicator that groups like Anonymous or LulzSec, two of the larger “hacktivist” groups on the Web, were not behind the attacks, as use of botnets on that scale is not part of their usual modus operandi.
However, customers of the affected banks can rest assured that these attacks did not result in the exposure of any of their personal or financial data, the report said. Further, ATM systems and other unrelated networks were likewise not affected.
Whenever a consumer is worried that their bank or credit card account might have been hacked, they should carefully check over their transaction history to see if they can spot any unfamiliar transactions made, as these are the best indicators that such an incident resulted in identity theft.
Image: ericnvntr, via Flickr
October 19, 2023
Identity Theft and Scams
May 17, 2022
Identity Theft and Scams
May 20, 2021
Identity Theft and Scams