Company Details
dbs-bank
33,276
1,063,313
52211
dbs.com
0
DBS_2911825
In-progress

DBS Bank Company CyberSecurity Posture
dbs.comDBS is a leading financial services group in Asia with a presence in 19 markets. Headquartered and listed in Singapore, DBS is in the three key Asian axes of growth: Greater China, Southeast Asia and South Asia. The bank's "AA-" and "Aa1" credit ratings are among the highest in the world. Recognised for its global leadership, DBS has been named “World’s Best Bank” by Global Finance, “World’s Best Bank” by Euromoney and “Global Bank of the Year” by The Banker. The bank is at the forefront of leveraging digital technology to shape the future of banking, having been named “World’s Best Digital Bank” by Euromoney and the world’s “Most Innovative in Digital Banking” by The Banker. In addition, DBS has been accorded the “Safest Bank in Asia“ award by Global Finance for 14 consecutive years from 2009 to 2022. DBS provides a full range of services in consumer, SME and corporate banking. As a bank born and bred in Asia, DBS understands the intricacies of doing business in the region’s most dynamic markets. DBS is committed to building lasting relationships with customers, as it banks the Asian way. Through the DBS Foundation, the bank creates impact beyond banking by supporting social enterprises: businesses with a double bottom-line of profit and social and/or environmental impact. DBS Foundation also gives back to society in various ways, including equipping communities with future-ready skills and building food resilience. With its extensive network of operations in Asia and emphasis on engaging and empowering its staff, DBS presents exciting career opportunities. For more information, please visit www.dbs.com
Company Details
dbs-bank
33,276
1,063,313
52211
dbs.com
0
DBS_2911825
In-progress
Between 750 and 799

DBS Bank Global Score (TPRM)XXXX

Description: DBS Bank, a leading financial institution in Singapore, fell victim to a **ghost-tapping** cyberattack targeting its customers' payment cards linked to mobile wallets like **Apple Pay**. Between **October and December 2024**, cybercriminals—primarily Chinese-speaking threat actors—exploited **NFC relay techniques** to conduct **in-person retail fraud** using stolen card credentials. The attack involved **automated systems** to harvest and add compromised DBS Bank cards to mobile wallets at **4-8 minute intervals**, bypassing authentication measures. A total of **656 incidents** were reported, with **502 cases** specifically tied to Apple Pay, resulting in **financial losses exceeding $1.2 million SGD**. The **ghost-tapping ecosystem** leveraged **burner phones**, **NFCGate tools**, and a **criminal supply chain** spanning **Cambodia and China**, enabling real-time relay of tokenized payment data to money mules at retail terminals. The attack exploited **legitimate NFC protocols**, circumventing multi-factor authentication and time-limited security features. While no **large-scale data breach** of DBS’s core systems was confirmed, the incident exposed vulnerabilities in **contactless payment security**, leading to **direct financial fraud** against customers and reputational risks for the bank due to **media coverage** of the sophisticated attack method.


No incidents recorded for DBS Bank in 2025.
No incidents recorded for DBS Bank in 2025.
No incidents recorded for DBS Bank in 2025.
DBS Bank cyber incidents detection timeline including parent company and subsidiaries

DBS is a leading financial services group in Asia with a presence in 19 markets. Headquartered and listed in Singapore, DBS is in the three key Asian axes of growth: Greater China, Southeast Asia and South Asia. The bank's "AA-" and "Aa1" credit ratings are among the highest in the world. Recognised for its global leadership, DBS has been named “World’s Best Bank” by Global Finance, “World’s Best Bank” by Euromoney and “Global Bank of the Year” by The Banker. The bank is at the forefront of leveraging digital technology to shape the future of banking, having been named “World’s Best Digital Bank” by Euromoney and the world’s “Most Innovative in Digital Banking” by The Banker. In addition, DBS has been accorded the “Safest Bank in Asia“ award by Global Finance for 14 consecutive years from 2009 to 2022. DBS provides a full range of services in consumer, SME and corporate banking. As a bank born and bred in Asia, DBS understands the intricacies of doing business in the region’s most dynamic markets. DBS is committed to building lasting relationships with customers, as it banks the Asian way. Through the DBS Foundation, the bank creates impact beyond banking by supporting social enterprises: businesses with a double bottom-line of profit and social and/or environmental impact. DBS Foundation also gives back to society in various ways, including equipping communities with future-ready skills and building food resilience. With its extensive network of operations in Asia and emphasis on engaging and empowering its staff, DBS presents exciting career opportunities. For more information, please visit www.dbs.com


Access Bank Plc is a full service commercial Bank operating through a network of over 600 branches and service outlets located in major centres across Nigeria, Sub Saharan Africa and the United Kingdom. Listed on the Nigerian Stock Exchange in 1998, the Bank serves its various markets through 5 busi

Comerica Incorporated (NYSE: CMA) is a financial services company headquartered in Dallas, Texas, strategically aligned by the Business Bank, the Retail Bank, and Wealth Management. The Business Bank provides companies of all sizes with an array of credit and non-credit financial products and servic

The Toronto-Dominion Bank & its subsidiaries are collectively known as TD Bank Group (TD). TD is the sixth largest bank in North America by assets & serves approx. 28 million customers in a number of locations in key financial centres around the globe. With over 95,000 employees, TD ranks among the

Perjalanan Bank Mega berawal pada tahun 1969, dengan nama PT Bank Karman di Surabaya. Kemudian bertransformasi menjadi Mega Bank pada tahun 1992, dan berpindah lokasi ke Jakarta. Pada tahun 1996, Chairul Tanjung dengan PARA GROUP, yang kini dikenal dengan CT Corpora, mengambil alih dan membuat gebra

Abbey National plc is the 6th biggest UK bank with 705 branches under the Abbey brand. It also uses the Cahoot and since September 2008, the Bradford and Bingley savings brands. Subsidiary banks include Cater Allen Limited. Since 2004 Abbey has been part of the Santander group. Santander is the larg

Allied Bank is one of Pakistan's leading banks, with a vision to become a dynamic and efficient institution providing integrated solutions, aiming to be the first choice for customers. Currently, the bank maintains a country-wide network of over 1,400 branches and more than 1,560 ATMs. To protect y
Somos una Corporación líder y comprometida con el país que brinda servicios financieros de excelencia a cada segmento de clientes. Buscamos permanentemente ser el mejor Banco para ellos, ser el mejor lugar para trabajar y ser la mejor inversión para nuestros accionistas. Lo hacemos de forma colabora

We are the leading financial group in the Spanish market, comprised of banking business, insurance activity and investments in international banks and leading companies in the services sector. CaixaBank is a financial group with a socially responsible, long-term universal banking model, based on qua

Welcome to Huntington. Huntington Bancshares Incorporated is a $210 billion asset regional bank holding company headquartered in Columbus, Ohio. Founded in 1866, The Huntington National Bank and its affiliates provide consumers, small and middle-market businesses, corporations, municipalities, and
.png)
As corporate scams grow more sophisticated, and scammers masterfully exploit the human psyche and thrive on uneven defences, multi-layered...
Hong Kong, 29 Jun 2025 - In response to a sharp increase in cyber threats targeting local businesses, DBS Bank (Hong Kong) Limited (“DBS Hong Kong”) today...
Cybercriminals are increasingly using artificial intelligence (AI) to create convincing and hard-to-detect attacks.
Many FIs host labs nurturing outside startups. These labs operate around the world and focus on everything from deploying Gen AI to...
MAS and CSA are studying the possibility of requiring vendors to obtain these certifications before they can be licensed or bid for government contracts.
Customer data from DBS and Bank of China's Singapore branch (BOC) were stolen when their printing vendor was hit by a ransomware attack last week.
A ransomware attack on a printing vendor has affected DBS and Bank of China – two major banks in Asia. Thousands of customers are exposed.
Toppan Next Tech, a printing vendor for several financial institutions in Singapore, suffered a ransomware attack that compromised information associated with...
The recent cyber incident involving DBS and Bank of China Singapore, where customer data has been reportedly extracted after a ransomware attack on a printing...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of DBS Bank is https://www.dbs.com/default.page.
According to Rankiteo, DBS Bank’s AI-generated cybersecurity score is 788, reflecting their Fair security posture.
According to Rankiteo, DBS Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, DBS Bank is not certified under SOC 2 Type 1.
According to Rankiteo, DBS Bank does not hold a SOC 2 Type 2 certification.
According to Rankiteo, DBS Bank is not listed as GDPR compliant.
According to Rankiteo, DBS Bank does not currently maintain PCI DSS compliance.
According to Rankiteo, DBS Bank is not compliant with HIPAA regulations.
According to Rankiteo,DBS Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
DBS Bank operates primarily in the Banking industry.
DBS Bank employs approximately 33,276 people worldwide.
DBS Bank presently has no subsidiaries across any sectors.
DBS Bank’s official LinkedIn profile has approximately 1,063,313 followers.
DBS Bank is classified under the NAICS code 52211, which corresponds to Commercial Banking.
No, DBS Bank does not have a profile on Crunchbase.
Yes, DBS Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dbs-bank.
As of November 27, 2025, Rankiteo reports that DBS Bank has experienced 1 cybersecurity incidents.
DBS Bank has an estimated 6,710 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $1.20 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with likely (by dbs bank, apple, google), and third party assistance with recorded future (threat intelligence), third party assistance with singapore authorities (investigation), third party assistance with cybersecurity firms (forensic analysis), and law enforcement notified with singapore police force (656 cases reported), law enforcement notified with potential interpol coordination (cross-border crime), and containment measures with enhanced mfa for mobile wallet onboarding, containment measures with transaction velocity limits, containment measures with geofencing for suspicious nfc transactions, and remediation measures with patch nfc protocol vulnerabilities, remediation measures with customer notification & card reissuance, remediation measures with phishing awareness campaigns, and recovery measures with fraudulent transaction reversals, recovery measures with compensation for affected users, recovery measures with collaboration with retailers to flag mule activity, and communication strategy with public advisories (singapore authorities), communication strategy with customer alerts (apple/google/dbs), communication strategy with media statements on mitigation efforts, and enhanced monitoring with nfc transaction anomaly detection, enhanced monitoring with dark web monitoring for stolen credentials, enhanced monitoring with telegram channel surveillance (e.g., @webu8)..
Title: Ghost-Tapping Cyber Fraud Campaign Targeting Mobile Wallet Payment Systems (Apple Pay, Google Pay)
Description: A sophisticated cybercriminal technique called 'ghost-tapping' emerged as a significant threat to contactless payment systems, exploiting stolen payment card details linked to mobile wallet services like Apple Pay and Google Pay. The attack leverages NFC relay tactics to facilitate retail fraud, transforming digital theft into physical goods via an elaborate network of mules and automated systems. The campaign spans multiple countries, primarily orchestrated by Chinese-speaking threat actors, and involves a convergence of phishing, NFC relay technology, and a criminal supply chain for burner phones and stolen credentials. Between October–December 2024, 656 compromised mobile wallet cases were reported in Singapore, with 502 specifically targeting Apple Pay, resulting in losses exceeding $1.2 million SGD.
Date Detected: 2024-10-01
Date Publicly Disclosed: 2024-12-31
Type: Financial Fraud
Attack Vector: Phishing (Credential Harvesting)Mobile MalwareNFC Relay (via NFCGate)Automated Card Addition to Mobile WalletsBurner Phone Supply ChainMoney Mule Networks
Vulnerability Exploited: Weak Authentication in Mobile Wallet OnboardingNFC Protocol Abuse (Legitimate Traffic Relay)Bypass of Time-Limited MFA WindowsLack of Geofencing for Transaction ValidationExploitable Gaps in Contactless Payment Tokenization
Threat Actor: Name: @webu8 (Telegram Handle), Affiliation: Chinese-Speaking Cybercriminal Syndicate, Role: Supplier of Burner Phones, Ghost-Tapping Services, and Stolen Credentials, Location: ['Cambodia', 'China'], Language: Chinese, Tools Used: ['NFCGate (Repurposed Android App)', 'Automated Card Addition Scripts', 'Telegram for Criminal Coordination'], Name: Unnamed Criminal Syndicates, Affiliation: Southeast Asian Cybercrime Networks, Role: ['Phishing Operators', 'Money Mules', 'Logistics Coordinators', 'Dark Web Data Brokers'], Location: ['Cambodia', 'China', 'Singapore (Targeted)', 'Global (Victims)'], Language: Chinese, Tools Used: ['Custom NFC Relay Servers', 'Automated Phishing Kits', 'Mobile Malware (Credential Theft)'].
Motivation: Financial GainExploitation of Payment System WeaknessesScalable Fraud OperationsResale of Stolen Goods (Luxury Items)
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing Emails/SMS (Credential Harvesting)Mobile Malware (e.g. and Fake Banking Apps)Dark Web Data Dumps (Previously Breached Cards).

Financial Loss: $1.2 million SGD (Singapore alone, Q4 2024)
Data Compromised: Payment card credentials (656 cases in singapore), Mobile wallet tokens (apple pay: 502 cases), Personally identifiable information (via phishing/malware)
Systems Affected: Apple PayGoogle PayDBS Bank Card SystemsRetail POS Terminals (NFC-Enabled)Mobile Wallet Authentication Servers
Operational Impact: Increased Fraud Detection Costs for BanksDisruption to Contactless Payment TrustRetailer Chargeback BurdenRegulatory Scrutiny on Mobile Wallet Providers
Revenue Loss: ['Direct Fraudulent Purchases (Luxury Goods)', 'Potential Decline in Mobile Wallet Adoption']
Customer Complaints: 656 reported cases (Singapore, Q4 2024)
Brand Reputation Impact: Erosion of Trust in Apple Pay/Google Pay SecurityNegative Media Coverage for Affected Banks (e.g., DBS)Consumer Skepticism Toward Contactless Payments
Legal Liabilities: Potential Lawsuits from Affected CustomersRegulatory Fines for Compliance Violations (e.g., PCI DSS)
Identity Theft Risk: High (via Phishing/Malware)
Payment Information Risk: Critical (Tokenized Card Data Relayed in Real-Time)
Average Financial Loss: The average financial loss per incident is $1.20 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment Card Numbers, Mobile Wallet Tokens, Cvv/Cvc Codes (Via Phishing), Banking Credentials (Username/Password), Transaction Histories and .

Entity Name: Apple Inc. (Apple Pay)
Entity Type: Technology Company
Industry: Financial Technology (FinTech)
Location: Cupertino, California, USA
Size: Large (Global)
Customers Affected: 502 (Singapore, Q4 2024)

Entity Name: Google LLC (Google Pay)
Entity Type: Technology Company
Industry: Financial Technology (FinTech)
Location: Mountain View, California, USA
Size: Large (Global)
Customers Affected: Unspecified (Part of 656 total cases)

Entity Name: DBS Bank
Entity Type: Financial Institution
Industry: Banking
Location: Singapore
Size: Large (Regional)
Customers Affected: Targeted in Automated Card Addition Attacks

Entity Name: Retailers (Unspecified)
Entity Type: Business
Industry: Retail (Luxury Goods)
Location: Global (Mule Operations)
Size: Varies

Entity Name: Consumers (Mobile Wallet Users)
Entity Type: Individuals
Location: Global
Customers Affected: 656 (Reported in Singapore)

Incident Response Plan Activated: Likely (by DBS Bank, Apple, Google)
Third Party Assistance: Recorded Future (Threat Intelligence), Singapore Authorities (Investigation), Cybersecurity Firms (Forensic Analysis).
Law Enforcement Notified: Singapore Police Force (656 Cases Reported), Potential INTERPOL Coordination (Cross-Border Crime),
Containment Measures: Enhanced MFA for Mobile Wallet OnboardingTransaction Velocity LimitsGeofencing for Suspicious NFC Transactions
Remediation Measures: Patch NFC Protocol VulnerabilitiesCustomer Notification & Card ReissuancePhishing Awareness Campaigns
Recovery Measures: Fraudulent Transaction ReversalsCompensation for Affected UsersCollaboration with Retailers to Flag Mule Activity
Communication Strategy: Public Advisories (Singapore Authorities)Customer Alerts (Apple/Google/DBS)Media Statements on Mitigation Efforts
Enhanced Monitoring: NFC Transaction Anomaly DetectionDark Web Monitoring for Stolen CredentialsTelegram Channel Surveillance (e.g., @webu8)
Incident Response Plan: The company's incident response plan is described as Likely (by DBS Bank, Apple, Google).
Third-Party Assistance: The company involves third-party assistance in incident response through Recorded Future (Threat Intelligence), Singapore Authorities (Investigation), Cybersecurity Firms (Forensic Analysis), .

Type of Data Compromised: Payment card numbers, Mobile wallet tokens, Cvv/cvc codes (via phishing), Banking credentials (username/password), Transaction histories
Number of Records Exposed: 656 (Singapore, Q4 2024)
Sensitivity of Data: High (Financial + PII)
Data Exfiltration: Yes (via Phishing/Malware to Criminal Servers)
Data Encryption: Bypassed (Tokenization Exploited)
Personally Identifiable Information: Names (Linked to Cards)Email AddressesPhone NumbersPhysical Addresses (for Mule Coordination)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patch NFC Protocol Vulnerabilities, Customer Notification & Card Reissuance, Phishing Awareness Campaigns, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by enhanced mfa for mobile wallet onboarding, transaction velocity limits, geofencing for suspicious nfc transactions and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Fraudulent Transaction Reversals, Compensation for Affected Users, Collaboration with Retailers to Flag Mule Activity, .

Regulations Violated: Payment Card Industry Data Security Standard (PCI DSS), Singapore Personal Data Protection Act (PDPA), Potential GDPR (for EU Citizens Affected),
Legal Actions: Ongoing Investigations (Singapore), Potential Charges for Money Mules,
Regulatory Notifications: Monetary Authority of Singapore (MAS)Singapore Police Force (SPF)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Ongoing Investigations (Singapore), Potential Charges for Money Mules, .

Lessons Learned: NFC Relay Attacks Exploit Legitimate Protocols, Requiring Behavioral Detection, Automated Phishing/Malware Campaigns Can Scale Rapidly with Minimal Detection, Burner Phone Supply Chains Enable Persistent Fraud Operations, Cross-Border Criminal Collaboration Complicates Law Enforcement, Mobile Wallet Authentication Needs Adaptive, Context-Aware Controls

Recommendations: For Mobile Wallet Providers (Apple/Google): Implement Device Fingerprinting for Wallet Onboarding, Enforce Geofencing for High-Risk Transactions, Deploy AI-Based Anomaly Detection for NFC Relay Patterns, Collaborate with Banks on Real-Time Fraud Alerts. For Banks (e.g., DBS): Shorten MFA Approval Windows to <2 Minutes, Block Bulk Card Addition Attempts from Single IPs/Devices, Monitor Dark Web for Compromised Credentials, Educate Customers on Phishing Risks. For Retailers: Train Staff to Identify Mule Behavior (e.g., Bulk Luxury Purchases), Implement POS Transaction Velocity Checks, Report Suspicious NFC Transactions to Payment Networks. For Law Enforcement: Target Burner Phone Supply Chains (e.g., @webu8), Disrupt Telegram-Based Criminal Marketplaces, Enhance Cross-Border Information Sharing. For Consumers: Enable Transaction Alerts for Mobile Wallets, Avoid Storing Cards in Multiple Wallets, Regularly Check for Unauthorized Devices in Wallet Apps.
Key Lessons Learned: The key lessons learned from past incidents are NFC Relay Attacks Exploit Legitimate Protocols, Requiring Behavioral Detection,Automated Phishing/Malware Campaigns Can Scale Rapidly with Minimal Detection,Burner Phone Supply Chains Enable Persistent Fraud Operations,Cross-Border Criminal Collaboration Complicates Law Enforcement,Mobile Wallet Authentication Needs Adaptive, Context-Aware Controls.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: For: Banks (e.g., DBS), , For: Mobile Wallet Providers (Apple/Google), , For: Law Enforcement, , For: Consumers, , For: Retailers and .

Source: Recorded Future
URL: https://www.recordedfuture.com
Date Accessed: 2024-12-31

Source: Singapore Police Force (SPF) Advisory
URL: https://www.police.gov.sg
Date Accessed: 2024-12-30

Source: NFCGate GitHub Repository (Legitimate Tool Abused)
URL: https://github.com/NFCGate/NFCGate
Date Accessed: 2024-12-29

Source: DBS Bank Security Bulletin
URL: https://www.dbs.com
Date Accessed: 2024-12-28
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Recorded FutureUrl: https://www.recordedfuture.comDate Accessed: 2024-12-31, and Source: Singapore Police Force (SPF) AdvisoryUrl: https://www.police.gov.sgDate Accessed: 2024-12-30, and Source: NFCGate GitHub Repository (Legitimate Tool Abused)Url: https://github.com/NFCGate/NFCGateDate Accessed: 2024-12-29, and Source: DBS Bank Security BulletinUrl: https://www.dbs.comDate Accessed: 2024-12-28.

Investigation Status: Ongoing (Singapore Authorities + Private Sector)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Advisories (Singapore Authorities), Customer Alerts (Apple/Google/Dbs) and Media Statements On Mitigation Efforts.

Stakeholder Advisories: Singapore Monetary Authority (Mas) – Fraud Risk Warning, Apple Security Update (Ios 17.3+ Nfc Protections), Google Pay Fraud Prevention Guide.
Customer Advisories: DBS Bank: 'Beware of Ghost-Tapping Scams' (Dec 2024)Apple Support: 'Protect Your Apple Pay from Unauthorized Use'Singapore Police Force: 'Contactless Payment Fraud Alert'
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Singapore Monetary Authority (Mas) – Fraud Risk Warning, Apple Security Update (Ios 17.3+ Nfc Protections), Google Pay Fraud Prevention Guide, Dbs Bank: 'Beware Of Ghost-Tapping Scams' (Dec 2024), Apple Support: 'Protect Your Apple Pay From Unauthorized Use', Singapore Police Force: 'Contactless Payment Fraud Alert' and .

Entry Point: Phishing Emails/Sms (Credential Harvesting), Mobile Malware (E.G., Fake Banking Apps), Dark Web Data Dumps (Previously Breached Cards),
Reconnaissance Period: Ongoing (Since at Least Q3 2024)
Backdoors Established: ['Persistent Access via Burner Phones', 'NFC Relay Infrastructure for Real-Time Exploitation']
High Value Targets: Apple Pay Users (502 Cases In Singapore), Dbs Bank Customers (Automated Attacks), Luxury Retailers (For Mule Purchases),
Data Sold on Dark Web: Apple Pay Users (502 Cases In Singapore), Dbs Bank Customers (Automated Attacks), Luxury Retailers (For Mule Purchases),

Root Causes: Over-Reliance On Static Authentication For Wallet Onboarding, Lack Of Nfc Transaction Context Awareness (E.G., Geolocation), Delayed Detection Of Automated Credential Stuffing, Fragmented Law Enforcement Response To Cross-Border Fraud,
Corrective Actions: Apple/Google: Mandatory Biometric Reauthentication For Wallet Changes, Banks: Real-Time Nfc Transaction Monitoring, Retailers: Mule Behavior Analytics At Pos, Regulators: Stricter Kyc For Burner Phone Purchases,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Recorded Future (Threat Intelligence), Singapore Authorities (Investigation), Cybersecurity Firms (Forensic Analysis), , Nfc Transaction Anomaly Detection, Dark Web Monitoring For Stolen Credentials, Telegram Channel Surveillance (E.G., @Webu8), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Apple/Google: Mandatory Biometric Reauthentication For Wallet Changes, Banks: Real-Time Nfc Transaction Monitoring, Retailers: Mule Behavior Analytics At Pos, Regulators: Stricter Kyc For Burner Phone Purchases, .
Last Attacking Group: The attacking group in the last incident were an Name: @webu8 (Telegram Handle)Affiliation: Chinese-Speaking Cybercriminal SyndicateRole: Supplier of Burner Phones, Ghost-Tapping Services, and Stolen CredentialsLocation: Cambodia, Location: China, Language: ChineseTools Used: NFCGate (Repurposed Android App), Tools Used: Automated Card Addition Scripts, Tools Used: Telegram for Criminal Coordination, Name: Unnamed Criminal SyndicatesAffiliation: Southeast Asian Cybercrime NetworksRole: Phishing Operators, Role: Money Mules, Role: Logistics Coordinators, Role: Dark Web Data Brokers, Location: Cambodia, Location: China, Location: Singapore (Targeted), Location: Global (Victims), Language: ChineseTools Used: Custom NFC Relay Servers, Tools Used: Automated Phishing Kits, Tools Used: Mobile Malware (Credential Theft) and .
Most Recent Incident Detected: The most recent incident detected was on 2024-10-01.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-12-31.
Highest Financial Loss: The highest financial loss from an incident was $1.2 million SGD (Singapore alone, Q4 2024).
Most Significant Data Compromised: The most significant data compromised in an incident were Payment Card Credentials (656 cases in Singapore), Mobile Wallet Tokens (Apple Pay: 502 cases), Personally Identifiable Information (via Phishing/Malware) and .
Most Significant System Affected: The most significant system affected in an incident was Apple PayGoogle PayDBS Bank Card SystemsRetail POS Terminals (NFC-Enabled)Mobile Wallet Authentication Servers.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was recorded future (threat intelligence), singapore authorities (investigation), cybersecurity firms (forensic analysis), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Enhanced MFA for Mobile Wallet OnboardingTransaction Velocity LimitsGeofencing for Suspicious NFC Transactions.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personally Identifiable Information (via Phishing/Malware), Mobile Wallet Tokens (Apple Pay: 502 cases) and Payment Card Credentials (656 cases in Singapore).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 866.0.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Ongoing Investigations (Singapore), Potential Charges for Money Mules, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Mobile Wallet Authentication Needs Adaptive, Context-Aware Controls.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was For: Banks (e.g., DBS), , For: Mobile Wallet Providers (Apple/Google), , For: Law Enforcement, , For: Consumers, , For: Retailers and .
Most Recent Source: The most recent source of information about an incident are NFCGate GitHub Repository (Legitimate Tool Abused), Singapore Police Force (SPF) Advisory, DBS Bank Security Bulletin and Recorded Future.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.recordedfuture.com, https://www.police.gov.sg, https://github.com/NFCGate/NFCGate, https://www.dbs.com .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Singapore Authorities + Private Sector).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Singapore Monetary Authority (MAS) – Fraud Risk Warning, Apple Security Update (iOS 17.3+ NFC Protections), Google Pay Fraud Prevention Guide, .
Most Recent Customer Advisory: The most recent customer advisory issued was an DBS Bank: 'Beware of Ghost-Tapping Scams' (Dec 2024)Apple Support: 'Protect Your Apple Pay from Unauthorized Use'Singapore Police Force: 'Contactless Payment Fraud Alert'.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Ongoing (Since at Least Q3 2024).
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.