HomeCII/OTPayment Card-Skimming Attacks Expand to North American Websites

Payment Card-Skimming Attacks Expand to North American Websites

Published on

spot_img

A Chinese-speaking threat actor that has been targeting ecommerce sites and point-of-sale service providers in the Asia/Pacific region for over a year has expanded its activities to North and Latin America. This recent shift in focus has caught the attention of cybersecurity researchers who have dubbed the campaign “Silent Skimmer.”

According to BlackBerry researchers, the threat actor has been exploiting vulnerabilities in web applications to gain unauthorized access to the targeted sites. In particular, they have taken advantage of a vulnerability that has also been used by China’s Hafnium group in previous cyber espionage campaigns. Once inside, the attackers aim to compromise the payment pages of these sites and deploy malware designed to steal credit card information from online shoppers.

While card-skimming attacks are not new, this latest campaign has raised concerns due to its technical complexity, leading researchers to speculate that an advanced and experienced threat actor may be behind it. Over the years, various hacking groups collectively known as Magecart have successfully carried out similar attacks, stealing payment card data from millions of online shoppers worldwide. Magecart attackers often target vulnerabilities in third-party software components and inject malicious code into them.

The Silent Skimmer campaign, however, appears to be opportunistic in nature. The threat actor takes advantage of vulnerabilities in web-facing applications, with many of the targeted sites hosted on Microsoft’s Internet Information Services (IIS) Web server software. In particular, the attackers have exploited a critical remote code execution bug known as CVE-2019-18935 in Telerik UI, a suite of web development tools. This vulnerability has also been utilized by other threat groups, including Hafnium and Vietnam’s XE Group.

Once they gain access to the target web service, the threat actors upload a malicious dynamic link library (DLL) to a specific directory and subsequently install credit card skimming malware on the compromised website. To carry out their activities, the attackers employ various tools for privilege escalation, remote access, remote code execution, malware delivery, and post-exploit activities. Interestingly, they rely on legitimate open-source tools, binaries, and scripts, which is a common trend in modern malware campaigns.

One notable aspect of the Silent Skimmer campaign is the attacker’s skill in adjusting their command-and-control (C2) infrastructure based on the geolocation of their victims. To avoid detection, the threat actor uses virtual private servers (VPS), often hosted on Microsoft’s Azure platform, as C2 servers for newly acquired targets. These C2 servers are frequently online for less than a week and are located in the same region or country as the victim. By blending their traffic with normal network activity, the attackers make it more difficult for security teams to detect their malicious activities.

As the Silent Skimmer campaign expands its targeting to North and Latin America, it emphasizes the need for enhanced security measures and vulnerability management practices across ecommerce sites and point-of-sale service providers. Organizations should regularly patch their systems, monitor for suspicious activities, and deploy robust security solutions to protect customer payment data. Additionally, educating users about the risks of online transactions and reminding them to use secure payment methods can help prevent falling victim to these types of attacks.

Overall, the Silent Skimmer campaign serves as a reminder that card-skimming attacks continue to pose a significant threat to the security of online transactions. Both individuals and organizations must remain vigilant in protecting sensitive payment card information to minimize the impact of these malicious activities.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...