Card Skimmer Group Replaces Checkout Page to Steal Payment Info

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
A payment service platform's checkout page was recently cloned by the threat actors behind a web skimming campaign that harvested and stole credit card information from an online shop's customers.

Web skimming (also known as e-skimming) is the process through which fraudsters can harvest and steal customers' payment or personally identifiable information (PII) after injecting malicious code in the form of payment card skimmer scripts within a compromised e-commerce site's payment processing platform (PSP).

The e-skimming campaign observed by Malwarebytes Director of Threat Intelligence Jérôme Segura used scripts designed to steal data from the online store's input, select, and textarea elements, but it also went straight to the PSP, replacing its checkout page to collect the victims' credit card data.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top