Top ten reviews ING let visitors think that the site was ge lwa nfecteerd

0
280

The site of ING, seemed to be equally prey to the are cases in to cyber criminals. On mijn.ing.nl was javascript code found that at first glance made seemed to inlogsessies to listen. The bank says that it is a top ten reviews.

Customers of the bank discovered that the site of ING a file was loaded from the domain primebyte.net. This seemingly unused domain in april of this year registered, but the server contains a javascript file that has a url on it in may of captured domain vsonicw.com call. Both domains are in the United States hosted.

On our forum found Thursday afternoon a fierce discussion about the use of javascript code. A further analysis of the code seemed to indicate that this is intended to be a kind of man-in-the-middle attack is possible, where the session of an unsuspecting user being hijacked. Although it is not immediately possible to carry out the transactions, it is in theory possible to provide the data to adjust, for example, or a Paypal account to the account to link.

ING said in a reaction opposite Tweakers.net that there is indeed javascript code from an external domain was accessed, but denies that the site has been hacked. “We’re testing software that enables us to certain types of fraud and phishing to track down,” said a spokesman of the bank.

More information, including why the bank this shadowy domain names and its production environment, the spokesman for security reasons do not give. The bank also intends to not confirm or she is the method behind the software have developed, or that it is in the hands of another company. “Further, we do not make statements about. We want criminals not to be wiser than they already are.”

To have ING to do this, however, a third party enabled. The conscious papi.js file is previously also by customers of the Alliance-Leicester bank discovered. A&L confirmed that the used external domain property of that bank was.