Friday, January 24, 2025
HomeCyber Security NewsMicrosoft Warned That Hackers Are Using More Advanced Techniques to Steal Credit...

Microsoft Warned That Hackers Are Using More Advanced Techniques to Steal Credit Card Data

Published on

SIEM as a Service

Follow Us on Google News

It has been observed by researchers from Microsoft that credit card skimmers are on the rise, in which threat actors are employing more sophisticated methods in order to hide their malicious code that steals information from consumers.

In order to avoid detection, threat actors hide their code snippets in image files, inject them into web applications that are popular, and disguise them as white-hat sites.

Due to this, threat detection products lose their effectiveness and make it harder to detect threats. As a result, this situation compromises the users’ security and privacy.

How does Web Skimming Work?

An important purpose of web skimming campaigns is to capture and exfiltrate, during the checkout process, customers’ payment information, such as their credit card number.

For this purpose, attackers typically attack e-commerce platforms and Content Management Systems (CMSs) using vulnerabilities to gain access to specific pages on which they want to insert the script for skimming.

Another method that is often used to attack supply chains is the use of web-based attacks. The attackers resort to this method by exploiting the vulnerabilities in third-party plugins, third-party themes, or compromising ad networks to serve malicious ads.

This increased frequency of attacks was the reason that the PCI SSC issued a bulletin, warning users of the threat and urging them to take action.

Sneaky and Sophisticated Skimmers

An upswing in the use of three traditional hiding methods was observed by security analysts as part of the analysis and here they are:-

  • Injecting the scripts into images
  • String concatenation
  • Script spoofing

In the first scenario, as false favicon files, the malicious image files are injected into the target server. The contents of these files include a PHP script which is accompanied by a Javascript that is encoded in base64.

After identifying the checkout page, the script runs a check to exclude the administrator user from viewing the page and then serves a fake form to visitors that are not affiliated with the site.

As part of the attack, the attackers use string concatenation obfuscation to load the scanner using an implant on the target website that loads the scanner from a domain under their control.

In the case of the skimmer itself, the obfuscation is unnecessary, since it is not hosted on the targeted platform but is instead base64 encoded and concatenated from several strings.

One more trend that is showing up across virtually every website is the use of script spoofing, where scammers manufacture fake Google Analytics or Meta Pixel tracking pages to make skimmers appear legitimate.

For now, the only way the customers can minimize the damage caused by skimmers is to use one-time private cards, set strict payment limits, or use electronic payment methods, rather than using paper checks.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...