Hackers use Web Skimming to Steal Payments from Online Shoppers

According to researchers from Kaspersky, hackers have devised a new technique for stealing users’ payment information on online shopping websites – a type of attack known as web skimming.

Web skimming is a popular practice used by attackers to steal users’ credit card details from the payment pages of online stores, whereby attackers inject pieces of code into the source code of the website. This malicious code then collects the data inputted by visitors to the site (i.e. payment account logins or credit card numbers) and sends the harvested data to the address specified by attackers.

Often, to conceal the fact that the webpage has been compromised, attackers register domains with names that resemble popular web analytics services, such as Google Analytics. That way, when they inject the malicious code, it’s harder for the site administrator to know that the site has been compromised. For example, a site named “googlc-analytics[.]com” is easy to mistake as a legitimate domain.

“This is a technique we have not seen before and one that is particularly effective. Google Analytics is one of the most popular web analytics services out there. The vast majority of developers and users trust it, meaning it’s frequently given permission to collect user data by site administrator,” says Victoria Vlasova, Senior Malware Analyst at Kaspersky.

That makes malicious injects containing Google Analytics accounts inconspicuous – and easy to overlook. As a rule, administrators should not assume that, just because the third-party resource is legitimate, its presence in the code is ok,” she concludes.

Recently, however, Kaspersky researchers have discovered a previously unknown technique for conducting web skimming attacks. Rather than redirecting the data to third-party sources, they redirected it to official Google Analytics accounts.

Because the data isn’t being directed to an unknown third-party resource, it’s difficult for administrators to realise the site has been compromised. For those examining the source code, it just appears as if the page is connected with an official Google Analytics account – a common practice for online stores.

To make the malicious activity even harder to spot, the attackers also employed a common anti-debugging technique: if a site administrator reviews the webpage source code using Developer mode, then the malicious code is not executed.

Many websites were found to be compromised in this way, which included stores in Europe and North and South America.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 844 other subscribers

About Evans Taylor

I am a blogger and internet pundit. Interested in all DNS developments all over the World especially the developing countries

Leave a Reply