Card-Skimming Malware Have Changed Tactics Throughout the Years, Microsoft Says

26 tháng 5, 2022

Card-skimming malware actors have been deploying various methods to carry out their schemes in the last 10 years.

According to the researchers from Microsoft, the hackers have been devising their techniques in infiltrating security defenses. This means that there's an evolution in the way they hack a system through JavaScript code.


Card-Skimmers Are Pulling Out New Tricks

(Photo : Eduardo Soares from Unsplash)
Microsoft researchers found out that the card-skimming malware is switching its strategy to bypass security defenses.


According to a report by ZDNet, Microsoft experts have found out that credit card skimmers have switched methods in delivering malware to the system.


For the past decade, the card-skimming malware "Magecart" has been on the front lines. To note, this malicious software can easily steal your credit card information by injecting scripts into the checkout sites.


Microsoft has flagged injecting JavaScript to the front-end activities as "conspicuous." With that being said, the company believes that it could trigger protections in the browser, including Content Security Policy (CSP).


It should be noted that last November, the firm discovered a bogus browser favicon that made its way to a server. This was hosted in an e-commerce platform dubbed "Magento."


At the time, the hackers have been targeting the buyers. The researchers concluded that the PHP script could only operate after the confirmation through the cookies.


After running it, the checkout page in Magneto will generate the URL of the site. Additionally, two keyboards will appear during the operation -- "checkout" and "one page."


"The insertion of the PHP script in an image file is interesting because, by default, the webserver wouldn't run the said code. Based on previous similar attacks, we believe that the attacker used a PHP 'include' expression to include the image (that contains the PHP code) in the website's index page, so that it automatically loads at every webpage visit," Microsoft wrote on its blog.


Card-Skimming Actors Are Relying on Malicious PHP


Speaking of the technique done by the credit card hackers, the FBI has warned the users regarding the new tactics done by the attackers. The agency said that the actors are utilizing PHP to compromise the checkout pages of the business across the US.


Per Sucuri, the PHP skimmers that are hitting the web servers on the backend have a connection to 41% of credit-card skimming cases last year.


Furthermore, Jerome Segura of cybersecurity firm Malwarebytes wrote that the evolving technique is "interesting" since the skimmer could continue the operations without getting blocked by the security tools.


There have been some instances that the card-skimming malware has been using JavaScript to imitate scripts from Meta Pixel and Google Analytics.



What About Gas Pump Skimmers?


Per Reader's Digest, some people could not easily distinguish what's a gas pump skimmer and what's not. Usually, the sign that you need to watch out for it is if it will budge even the slightest.


Since they are connected to the card readers, they could stick out for a while. Aside from the customers who often fall into this trap, some professionals who know surveillance can also be deceived by the gas pump skimmers.


It's important to pay attention to the card-reading slots and keypads in the machines. You should also check if the lockable door is tightly closed. There should be no signs of tampering.


Source: techtimes.com

Bạn cũng có thể quan tâm

4 tháng 6, 2024
Bộ định tuyến chơi game TP-Link Archer C5400X dễ mắc phải các lỗi bảo mật có thể cho phép kẻ tấn công từ xa, không được xác thực thực thi các lệnh trên thiết bị.
3 tháng 6, 2024
Ngày 27 tháng 5 Check Point đã cảnh báo rằng các tác nhân đe dọa đang nhắm mục tiêu vào các thiết bị VPN truy cập từ xa của Check Point trong một chiến dịch đang diễn ra nhằm xâm phạm mạng doanh nghiệp.
31 tháng 5, 2024
Công ty quản lý đơn thuốc Sav-Rx cảnh báo hơn 2,8 triệu cá nhân ở Hoa Kỳ việc họ đã bị vi phạm dữ liệu và dữ liệu cá nhân của họ đã bị đánh cắp trong một cuộc tấn công mạng năm 2023.
Thêm bài viết
Share by: