Friday, March 29, 2024

Microsoft Warned That Hackers Are Using More Advanced Techniques to Steal Credit Card Data

It has been observed by researchers from Microsoft that credit card skimmers are on the rise, in which threat actors are employing more sophisticated methods in order to hide their malicious code that steals information from consumers.

In order to avoid detection, threat actors hide their code snippets in image files, inject them into web applications that are popular, and disguise them as white-hat sites.

Due to this, threat detection products lose their effectiveness and make it harder to detect threats. As a result, this situation compromises the users’ security and privacy.

How does Web Skimming Work?

An important purpose of web skimming campaigns is to capture and exfiltrate, during the checkout process, customers’ payment information, such as their credit card number.

For this purpose, attackers typically attack e-commerce platforms and Content Management Systems (CMSs) using vulnerabilities to gain access to specific pages on which they want to insert the script for skimming.

Another method that is often used to attack supply chains is the use of web-based attacks. The attackers resort to this method by exploiting the vulnerabilities in third-party plugins, third-party themes, or compromising ad networks to serve malicious ads.

This increased frequency of attacks was the reason that the PCI SSC issued a bulletin, warning users of the threat and urging them to take action.

Sneaky and Sophisticated Skimmers

An upswing in the use of three traditional hiding methods was observed by security analysts as part of the analysis and here they are:-

  • Injecting the scripts into images
  • String concatenation
  • Script spoofing

In the first scenario, as false favicon files, the malicious image files are injected into the target server. The contents of these files include a PHP script which is accompanied by a Javascript that is encoded in base64.

After identifying the checkout page, the script runs a check to exclude the administrator user from viewing the page and then serves a fake form to visitors that are not affiliated with the site.

As part of the attack, the attackers use string concatenation obfuscation to load the scanner using an implant on the target website that loads the scanner from a domain under their control.

In the case of the skimmer itself, the obfuscation is unnecessary, since it is not hosted on the targeted platform but is instead base64 encoded and concatenated from several strings.

One more trend that is showing up across virtually every website is the use of script spoofing, where scammers manufacture fake Google Analytics or Meta Pixel tracking pages to make skimmers appear legitimate.

For now, the only way the customers can minimize the damage caused by skimmers is to use one-time private cards, set strict payment limits, or use electronic payment methods, rather than using paper checks.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles