Taking to his Twitter handle, the PTI leader said: "It is a major failure of our intelligence agencies, especially the Intelligence Bureau (IB)".
"Besides political matters, important discussion on security and foreign affairs are in their hands," he added, The News reported.
Raising questions over the security of the PM Office, Khyber Pakhtunkhwa Finance Minister Taimur Khan Jhagra said: "8GB of hacked leaks from PMO. Regardless of who is speaking, this Orwellian culture of recordings is disgusting."
The leaked audio clip has rung alarm bells and raised serious questions about the security of PM House.
It is also being said that there are secret recording systems installed at PM House which even government representatives are unaware of, The News reported.
An audio clip involving a meeting chaired by Pakistan Prime Minister Shehbaz Sharif and attended by the top PML-N leadership at the Prime Minister's House has leaked online, raising questions over the security of the premises, it said.
A day earlier, a leaked audio had gone viral on social media - allegedly featuring Prime Minister Shehbaz Sharif - containing a discussion regarding PML-N Vice President Maryam Nawaz asking for a power plant from India to be imported for her son-in-law.
Another alleged audio conversation of the two has been leaked where Maryam Nawaz can be heard advising Shehbaz Sharif to jack up fuel prices, ARY News reported.
Maryam Nawaz, who had been opposing increase in fuel prices in media, said that jacking up fuel prices is inevitable.
The PML-N stalwart also complained about Finance Minister Miftah Ismail in an alleged leaked audio conversation with PM Shehbaz Sharif, ARY News reported.
"Uncle! US dollar is increasing and Miftah Ismail even not taking responsibility of the hike," she said. Praising Ishaq Dar, Maryam can be heard in the audio leak, saying: "Dar sahab has control on things, he knows what to do, but Miftah does not."
She said Miftah Ismail even does not know what he is doing and what results his actions will bring in the future.
He has disappointed, his complaints are coming from everywhere, said the Pakistan Muslim League-Nawaz Vice President in the alleged audio leak, ARY News reported.
"He doesn't take responsibility... says strange things on TV which people make fun of him for... he doesn't know what he is doing," the voice said to be Maryam's says in the alleged clip, Dawn reported.
"He clearly cut corners," the voice said to be PM Shehbaz Sharif's is heard as saying.
"Uncle, he doesn't know what he is doing," Maryam purportedly says, as she wishes for the return of PML-N stalwart Ishaq Dar.
Former Finance Minister Dar is set to to return next week to facilitate PM Shehbaz Sharif on the economic front, Dawn reported.
Independent cyber security researcher Rajshekhar Rajaria first reported that Domino's India has been hit by a hacker again, after Alon Gal who is CTO of cyber security firm Hudson Rock, claimed in April that credit card details of nearly 10 lakh people who purchased online on Domino's Pizza India were allegedly being sold for over Rs 4 crore on the Dark Web.
According to Rajaria, data of 18 crore orders from Domino's Pizza in India has now become public, that contains name, email, phone number and even the GPS location of the users.
According to him, the same person who earlier hacked financial services company MobiKwik has compromised Domino's India.
"The earlier hacker failed to receive ransom and sold the data to some unknown hacker, who has now posted the 13TB data of Domino's India on the Dark Web," Rajaria told IANS.
In an earlier statement, Jubilant Foodworks that owns the master franchise for Domino's Pizza in India, told IANS that the company experienced an information security incident recently.
"No data pertaining to financial information of any person was accessed and the incident has not resulted in any operational or business impact," the spokesperson said.
"As a policy, we do not store financial details or credit card data of our customers, thus no such information has been compromised".
According to Prakash Bell, Head of Customer Success and SE Lead, India and SAARC, Check Point Software Technologies, implementing technology solutions such as ZTNA, DLP, XDR and security posture management is key to ward off such incidents.
"Complementing these with employee education around data handling, vigilance, tight security controls, processes and audits would help creating the desired culture," Bell said in a statement.
There have been a string of hacking incidents involving Indian firms in the recent past, including Bigbasket, BuyUcoin, JusPay, Upstox and others.
The dark net is that part of the Internet which is inaccessible when using standard browsers like Google.
The study by cybersecurity company Bromium and researchers at the University of Surrey in Britain found that four in 10 dark net vendors are selling targeted hacking services aimed at FTSE 100 and Fortune 500 businesses.
The research provides details of first-hand intelligence gathered from covert discussions with dark net vendors, alongside analysis from a panel of global industry experts across law enforcement and government.
Furthermore, access to corporate networks is sold openly, with 60 per cent of vendors approached by researchers offering access to more than ten business networks each.
Of the dark net vendors who were engaged, 70 per cent invited researchers to talk on encrypted messaging applications, like Telegram, to take conversations beyond the reach of law enforcement.
More than 40 per cent of attempts by researchers to request dark net hacking services targeting companies in the Fortune 500 or FTSE 100 received positive responses from dark net vendors, the study said.
"Almost every vendor offered us tailored versions of malware as a way of targeting specific companies or industries. The more targeted the attack, the higher the cost, with prices rising even further when it involved high-value targets like banks," said Mike McGuire, Senior Lecturer in Criminology at the University of Surrey.
"The most expensive piece of malware found was designed to target ATMs and retailed for approximately $1,500," McGuire said.
These services typically come with service plans for conducting the hack, with prices ranging from $150 to $10,000 depending on the company involved and the extent to which the malware was customised for targeted attacks, said the study.
The research was presented at the InfoSecurity Europe conference in Olympia, London.
According to ZDNet, the cards' details is available on Joker's Stash -- one of the oldest card shops on the dark web which is known to be the place where major hackers sell card dumps.
The researchers from cyber security form Group-IBA found the Indian card holders' listing. Joker's Stash is advertising it under the "INDIA-MIX-NEW-01" heading.
The debit and credit cards belong to multiple Indian banks and are being sold for $100 each, in what security researchers have dubbed one of the biggest card dumps in recent years.
"Early data analysis suggests the card details may have been obtained via skimming devices, installed either on ATMs or point of sale (PoS) systems," said the report.
The card dump includes "Track 2 data, usually found on a payment card's magnetic stripe. The presence of this kind of data automatically rules out skimmers installed on websites (Magecart attacks), where Track 1 and Track 2 is never used."
Criminals who buy card dumps from Joker's Stash typically use the data to clone legitimate cards and withdraw money from ATMs in so-called "cash outs."
In February, card details for 2.15 million Americans were put up for sale on Joker's Stash.
In August, nearly 5.3 million card details obtained from gas and convenience chain Hy-Vee customers were also dumped on Joker's Stash.
Over the past five years, Joker's Stash has become one of the premier underground credit card shops through significant releases of stolen credit cards from data breaches at companies like Target, Walmart, Saks Fifth Avenue, Lord & Taylor, and British Airways.
On August 22, the dark web store released the first batch of stolen credit card data (dumps) from an alleged point-of-sale (POS) breach at the gas and convenience chain Hy-Vee. It is estimated that Joker's Stash lists 5.3 million credit card numbers related to this breach.
According to Rajaharia, the massive data dump on the Dark Web has been leaked from a compromised server of Bengaluru-based digital payments gateway Juspay.
JusPay told IANS that no card numbers or financial information were compromised during the cyber-attack and the actual number is much lower than the 10 crore-figure being reported.
"On August 18, 2020, an unauthorised attempt on our servers was detected and terminated when in progress. No card numbers, financial credentials or transaction data were compromised," a company spokesperson said in a statement.
"Some data records containing non-anonymised, plain-text email and phone numbers were compromised, which form a fraction of the 10 crore data records," the spokesperson added.
However, Rajaharia claimed that the data was being sold on the Dark Web for an undisclosed amount via cryptocurrency Bitcoin.
"For this data, hackers are also contacting via Telegram," he told IANS.
According to him, PCI DSS (Payment Card Industry Data Security Standard) have been followed by Juspay in storing users' card information.
"However, if the hackers can find out the Hash algorithm used to generate the card fingerprint, they will be able to decrypt the masked card number. In this condition, all 10 crore cardholders are at risk," Rajaharia noted.
The company admitted that the hacker gained access to one of Juspay's developer keys and was spawning new computation servers in the developer account, trying to gain access to any accessible data.
Juspay, however, said the masked card numbers that have been leaked are not considered sensitive as per compliance.
Only "few" phone numbers and email addresses have been leaked which have dummy values, the spokesperson said, adding that it had intimated its merchant partners about the data leak the very same day.
"No card numbers (like 16-digit card number and other financial credentials) were accessed, as it is stored in a completely different isolated system. No transaction or order information was compromised," the company spokesperson informed.
"We are making long-term investments for strengthening security and data governance with industry experts," the company said.
Founded in 2012, Juspay last year raised $21.6 million in its Series B funding round.
The round was led by Sweden's Vostok Emerging Finance (VEF), which invested $13 million in the technology firm, marking its first investment in the country.
(IANS)