Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

Chat CIMB kena hack?

views
     
Quantum Geist
post Dec 16 2018, 10:40 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


Looking at the page network traffic it's all going to either cimb server or google (for captcha most probably)

But I don't dare login with a real id
Quantum Geist
post Dec 16 2018, 10:48 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(feiraron @ Dec 16 2018, 10:45 PM)
OP dude the link you post got nothing to do with the capthcha thing, not even a mention there??

looks to me like their debit card is registered and linked with paypal and some sort of exploit there
*
Then got card numbers leak?
Quantum Geist
post Dec 16 2018, 10:53 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(se7en @ Dec 16 2018, 10:50 PM)
ok, ran through their page, apart from the recaptcha, nothing else to worry about.

and for the record, using recaptcha on a bank login page is plain dumb.
*
plus the weird placement of recaptcha is kinda throwing people off
Quantum Geist
post Dec 16 2018, 11:44 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(alpha001 @ Dec 16 2018, 11:42 PM)
so reCAPTCHA not an issue?
*
Most probably no, the captcha reports back to genuine google servers
Quantum Geist
post Dec 16 2018, 11:48 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(ahhann @ Dec 16 2018, 11:39 PM)
Tried app login. Put in correct username and correct image and correct password. Immediately prompt alert ask me go to their website to change password. De fuck? I just successfully login last week.
*
Been getting the same past few weeks, called their rep and all I got was "you probably put in the wrong password" response. I checked my account and there was no out of the ordinary transactions, changed the password to something I never used before. cimb is not my main account so I didn't think too much about it.
Quantum Geist
post Dec 17 2018, 12:15 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(briantwj @ Dec 17 2018, 12:05 AM)
Probably they notice weird IP hitting their front end. Even after blocking still weird IP appearing and the hits pattern are similar. Which is why they implement this captcha.

Just saying. icon_idea.gif
*
So dictionary or bruteforce attack? They still have to bypass TAC or they got card numbers to transfer to paypal.

Looks like Se7en got something judging by the update


Quantum Geist
post Dec 17 2018, 12:26 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


Reading around, apparently http without the s (no ssl) on cimb sure works

Really roasted whoever is handling the network
Quantum Geist
post Dec 17 2018, 12:49 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(HolySatan @ Dec 17 2018, 12:41 AM)
user posted image

dah kantoi since morning
*
How the heck cimb hash & store password sampai boleh buat macam tu
Quantum Geist
post Dec 17 2018, 12:55 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(briantwj @ Dec 17 2018, 12:53 AM)
This. Ppl can just bruteforce ur password now. As long as it hits the first 8 or the number or char u use on ur password. Then gg.

So.... No point changing password now. Lol. The change need to come from CIMB.
*
Nothing short of freezing online transaction can help
Quantum Geist
post Dec 17 2018, 01:02 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


So if kena what else can you do besides calling cimb and PayPal? Can report to bnm and claim some sort of damages from cimb?
Quantum Geist
post Dec 17 2018, 01:50 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(blacktubi @ Dec 17 2018, 01:47 AM)
“The standard DES-based crypt() returns the salt as the first two characters of the output. It also only uses the first eight characters of str, so longer strings that start with the same eight characters will generate the same result (when the same salt is used).”

Not sure if this is actually the case. My 2 cents. smile.gif

http://php.net/manual/en/function.crypt.php
*
Thought of the same thing, but if true cimb really cheapskate to dedicate resources for hashing
Quantum Geist
post Dec 17 2018, 08:23 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(hirano @ Dec 17 2018, 08:21 AM)
Security is part of IT dept.

I browsed cimb's twitter and fb, still they wont mention any shit about the issue. If 1st world country, they would have made press release and apologize.
*
I didn't catch anything on bfm news either, seems like there are still people who aren't aware of this case yet
Quantum Geist
post Dec 17 2018, 08:44 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(HolySatan @ Dec 17 2018, 08:36 AM)
user posted image

user posted image
*
so can we freeze/suspend our debit function from web?
Quantum Geist
post Dec 17 2018, 09:42 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(veron4best @ Dec 17 2018, 09:36 AM)
so in simple currently CIMB being attached hacker by:-

1. Brute Force
2. Buffer overflow


Correct?

And does changing password would solve this issue?

Or have to change all debit card, credit card number? Due to if hacker manage to get our card number, they can linked to Paypal?
*
most probably old passwords are hashed with DES which takes the first 8 char and ignores the rest. In this day and age bruteforcing 8 chars isn't that hard, no need for buffer overflow
Quantum Geist
post Dec 17 2018, 10:49 AM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(eltaria @ Dec 17 2018, 10:47 AM)
Yeah, I think ppl just confused with everything

The 8 password can login is probably not a bug, but a feature, maybe a bad 'user friendly' feature la.
Let's say you now have a mixture of users on 8 chareacter password and 8+ passwords, in their DB, they probably have a column, Over8Chars as true or false, they will know if u have updated ur password or not, in login, they may read this field if it's still 8 characters, to trim off excess characters.... from your password entry...
(Maybe too smart, and too user friendly until cause panic) and this is reported as a hack.

Remember, if they already bruteforce until ur 8 character pass is known, they don't need to add in additional digits anyway.
*
it's probably a hold out from an old system, by right they should have forced all users to reset their password
Quantum Geist
post Dec 17 2018, 12:54 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(lagista @ Dec 17 2018, 12:27 PM)
this one issit ??  hmm.gif

CIMB loses data backups
13 Nov 2017

https://forum.lowyat.net/topic/4455779

"The tape data does not contain any authentication data such as PINs, passwords or credit card CVV numbers," CIMB said in a statement today.
*
if that was the source, gg
Quantum Geist
post Dec 17 2018, 01:01 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(se7en @ Dec 17 2018, 12:55 PM)
will just leave this here for now

user posted image
*
ok that's stupid
Quantum Geist
post Dec 17 2018, 01:23 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(puchongite @ Dec 17 2018, 01:04 PM)
Not IT savvy. What's the problem with the code ?
*
those checks are supposed to be checked at server side, when kantoi client side it will give ideas to malicious people as to how the system in the back works.
Quantum Geist
post Dec 17 2018, 01:41 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(puchongite @ Dec 17 2018, 01:38 PM)
So the problem is historical and backend issue. People should quickly change to new format. Nothing to do with front end. If you throw old password with longer than 8 characters, the backend will be confused.
*
actually it checks if there are special characters and 8 characters or more;

if this is true use the new method

if this is false take just the first 8 characters and use the old method

This post has been edited by Quantum Geist: Dec 17 2018, 01:44 PM
Quantum Geist
post Dec 17 2018, 01:59 PM

Getting Started
**
Junior Member
109 posts

Joined: May 2013


QUOTE(Duckies @ Dec 17 2018, 01:51 PM)
But UAT website can show to public?

Bukan for internal only ke?
*
don't know how they handle things, but from my experience uat usually behind dmz

2 Pages  1 2 >Top
 

Change to:
| Lo-Fi Version
0.0572sec    0.70    7 queries    GZIP Disabled
Time is now: 9th December 2025 - 09:47 AM