Online Skimming — The Emerging Payment Card Fraud
In today’s world, where data holds immense value, cyber threats are becoming increasingly prevalent. Despite many organizations enhancing their security measures to protect sensitive information, hackers still manage to exploit minor vulnerabilities, turning them into significant breaches.
The Rise of Online Skimming
A new form of internet card fraud, known as Online/Web-based/Digital Skimming, is on the rise. This fraudulent activity involves stealing payment data during Card-Not-Present (CNP) transactions on e-commerce sites. Reports indicate that these attacks exploit misconfigured networks and use brute force tactics.
PCI SSC’s Recent Bulletin
The Payment Card Industry Security Standards Council (PCI SSC) recently issued a bulletin alerting e-commerce merchants and service providers about the growing threat of online card fraud. The bulletin highlights the severity of the threat and provides guidance on preventive measures.
Understanding Online Skimming
Online skimming, a term familiar to cybersecurity experts since 2015, has evolved from targeting physical ATMs to focusing on CNP transactions on e-commerce sites. Hackers inject malicious code into websites, making it challenging to detect and remove. This code captures payment information such as billing addresses, CVV2, PAN, and card expiration dates during transactions without the knowledge of customers or service providers.
The Role of Magecart
Magecart refers to various groups of cybercriminals that perform different types of skimming attacks. These groups compete with each other to steal and sell data on the dark web. They target the payment application infrastructure provided by third-party service providers to e-commerce merchants.
How Online Skimmers Operate
Hackers typically start by compromising the Content Delivery Network (CDN) implementations of service providers, injecting JavaScript sniffers used by merchants to facilitate payment transactions. These sniffers collect sensitive payment information entered by customers during purchases. A study by VISA’s Payment Fraud Disruption (PFD) and e-commerce Threat Disruption (eTD) found that attackers use the same infrastructure for multiple attacks, targeting service providers hosting code across several CDNs.
The Scale of the Threat
In July 2019, it was reported that 17,000 domains, integrated with initially targeted 8 web-based service providers in April 2019, were compromised. Attackers used two primary methods to exploit CDNs: leveraging common vulnerabilities such as misconfigurations and conducting brute force attacks. The payload, known as the inter digital skimming kit, used in these attacks is widely available on the dark web.
Preventive Measures
Online skimming attacks serve as a warning to service providers and merchants. To counter these threats, organizations must adopt several preventive measures:
- Regular Code Reviews: Frequently inspect your code for any vulnerabilities.
- Update Login Credentials: Ensure credentials are regularly updated.
- Proper CDN Configuration: Securely configure CDNs and restrict access.
- Consistent Configurations: Use a single, secure configuration for all implementations to avoid inconsistencies.
- Penetration Testing and Regular Patching: Conduct penetration tests and regularly apply patches to identify and close security gaps.
- Multi-layered Security Systems: Implement multiple layers of security to enhance protection.
- Checkout Solutions: Use redirect checkout solutions, allowing customers to enter payment information on a secure page separate from the main e-commerce site.
Conclusion
E-commerce merchants must adhere to best security practices and comply with PCI guidelines to mitigate the risks associated with online skimming. The consequences of data breaches can be severe, making proactive security measures essential in safeguarding against these evolving cyber threats.
Comments
Post a Comment