1. Home
  2.  |  
  3. Discussion | Analysis |  

Debit card Fraud: India’s biggest data security breach

Oct 27, 2016 14:05 IST

The RBI has requested that banks to change debit cards whose security is suspected to have been bargained in the wake of being utilized as a part of some Automated Teller Machines (ATMs). The issue was initially suspected by some payment gateways, for example, Visa, Mastercard and Rupay (by National Payments Corporation of India -NPCI), when it went to their notice that security could have been ruptured in a few occasions.

ONUS Credit cards and debit cards confront security issues when unapproved parties get access to some classified details inserted in the card. Such access may happen even as the card is being utilized as a part of an ATM.

Cards falling in the suspicious activities and requires substitution is estimated around 17.5 lakh. The total aggregate debit card base in the nation was 697 million starting July 2016. Banks, for example, State Bank of India (SBI), HDFC Bank and Bank of Baroda have as of now began supplanting the cards. SBI, the nation's biggest bank, has begun the way toward supplanting 0.6 million check cards. A few different banks, for example, Axis Bank, HDFC Bank and ICICI Bank, too have conceded being hit by comparative digital assaults driving Indian banks to either change or ask for clients to change their ATM pins around 3.2 million debit cards in recent two months.

CA eBook

How this emergency started and unfurled?
In the 1st week of September, a few banks witnessed fraudulent exchanges in which debit cards were utilized in the China and the US whereas card holders are in India. Cardholders also found this activities and many filed complained with banks. The banks griped to the National Payments Corporation of India (NPCI), which has regulation over retail payment frameworks in India. The test by NPCI found a malware-prompted security break in the frameworks of Hitachi Payment Services, which gives ATMs, PoS (Point of Sale) and other different services in India. The further examination affirmed that the security break happened in the ATMs of a specific private bank.

After the test found that ATMs security had been breached in May 2016, all the three service suppliers Visa, MasterCard and RuPay asked banks to either tell their customers who could possibly be at hazard to change their PIN, or issue them new cards. Most banks requested that clients change their ATM PIN, and in specific cases issued new cards by making the old ones null and void.

What is the scale of this fraud?
This is one of the greatest information breaches in the nation around 3.2 million cards issued by Indian banks could be possibly replaced, or their holders requested that change their PINs in order to avoid frauds. As per NPCI, 90 ATMs have been compromised, and no less than 641 card holders of over 19 banks have lost Rs 1.3 crore as a consequence of deceitful transaction on their debit cards.

Until last month as per Reserve Bank of India information India’s banks had issued an aggregate 712.39 million debit cards, whereas number of cards compromised by the breach may appear to be little in examination, the potential losses could in any case be significant if an extensive number of them are exposed with security lapses.

Debit CardHow does the malware function?
Malware is noxious programming including infections, worms, trojans, ransomware, spyware and different programs that harms PC frameworks at ATMs or bank servers, and permits fraudsters to get to private debit card information. For this situation, swiping a card at a supposedly compromised ATM permitted the information on the card to be conveyed to the criminal, who then abused it for fraud activities.

What actions are banks taking to secure cardholders?

Since the greater part of the cards at hazard are not chip-based, banks are wanting to supplant them with chip-based ones. The Maharashtra Police has started examinations concerning the security rupture and has kept in touch with the RBI looking for data on the fake exchanges. The council of Payment Card Industry Data Security Standard (PCIDSS), a worldwide body that sets information security standard, has requested a measurable review of the information rupture in India, which will be closed before the current month's over.

Who is at risk if a card is liable to misrepresentation organized by third party?

As indicated by the drafted circular issued by RBI on client protection, a customer is not subject for an outsider breach, or where carelessness or extortion is with respect to the bank, if the client illuminates the bank of the misrepresentation within 3 working days of accepting a correspondence from the banks on any unapproved exchange.

3 months Supplement CA

What actions is RBI taking to alleviate digital assaults on financial organizations?
In June 2016, RBI issued directions on a cyber security structure in banks, requesting that they set up a board-endorsed cyber security strategy, set up a cyber emergency management plan, and make course of action for nonstop surveillance. The circular additionally requested that banks must share any outbreak of cyber security occurrences to RBI. Aside from this, RBI has set up a specialist board on IT Examination and Cyber Security to give help with banks' cyber security activities, and proposes to cover, by 2017-18, all banks under a point by point IT examination program that it propelled in October 2015.

 

Is this article important for exams ? Yes6 People Agreed
Read more Current Affairs on: Debit card , State Bank of India

DISCLAIMER: JPL and its affiliates shall have no liability for any views, thoughts and comments expressed on this article.

Latest Videos

Register to get FREE updates

    All Fields Mandatory
  • (Ex:9123456789)
  • Please Select Your Interest
  • Please specify

  • ajax-loader
  • A verifcation code has been sent to
    your mobile number

    Please enter the verification code below

This website uses cookie or similar technologies, to enhance your browsing experience and provide personalised recommendations. By continuing to use our website, you agree to our Privacy Policy and Cookie Policy. OK