Two members of the hacker group ‘Indishell’ and its offshoots were arrested on charges of hacking an online mobile recharge portal, by Gautam Budh Nagar (Noida) cyber crime cell, reports The Times Of India.

The report stated that hackers had obtained admin rights to the portal, after hacking into the portal’s servers and were able to bypass the payment gateway page. Therefore, whenever users placed a recharge order for their prepaid mobile phones, DTH cards or data cards, these hackers would send the top up amount to the respective users, without generating any bill.

Citing Triveni Singh, Deputy superintendent of police (cyber crime cell), Gautam Budh Nagar, the report also adds that the issue was first raised by head of recharge at Memory Electronics Pvt Ltd and that the group had already cheated the company of more than Rs 50 lakh through these means.

Note that MediaNama is unable to verify any of the claims in the report. It is also not clear as to which is the above mentioned online recharge site, except for the fact that it is a Delhi-based company and was using CCAvenue as its payment gateway, as indicated by the report. It is also not clear if any sensitive user data was leaked from the portal during the process. Further, there is no information if if CCAvenue was also hacked during this process since the report suggests that the hackers had bypassed CCAvenue’s payment gateway page to transfer the money.

Similar Developments: In May 2011, reports had suggested that CCAvenue was compromised by a hacker who goes by the name d3hydr8 through a Hidden SQL injection, and all the admin passwords at CCAvenue were leaked to the public. In conversation with Medianama, CCAvenue CEO Vishwas Patel had however denied that their site was hacked and it was a mischevious slander against their name. He had claimed that the database screenshot put up, was not of their current database, which is on the live server and the usernames & passwords published were not the ones stored in their database.

Countering what Patel had claims in the interview, one of Medianama readers Akash Mahajan had pointed out a web server update log, in the comments to the post (screenshot), which indicated that the upgrade to Apache 2.2.17 for CCAvenue had took place that day instead of 5 months before, as stated by Patel in the interview.

Earlier this year, Microsoft India’s online store was hacked by a Chinese group identified as Evil Shadow and the user credentials were exposed to the public, since it stored both usernames and passwords in plain text. Later in the month, Microsoft had also admitted that financial information could have been compromised during the attack and had sent an advisory e-mail to registered users asking them to keep track of their credit card accounts for any unusual activity.