Ongoing Web Skimming Threats Targeting Payment Networks and Clients

Cybersecurity experts have uncovered a large-scale web skimming attack targeting notable payment providers, including American Express and Mastercard. The attack has threatened enterprise organizations since January 2022, affecting both payment processes and client data security.
Ongoing Web Skimming Threats Targeting Payment Networks and Clients
Table of Contents
    Add a header to begin generating the table of contents

    Cybersecurity analysts have flagged a significant ongoing web skimming offensive that has been targeting notable payment networks since January. High-profile names such as American Express, Diners Club, Discover, JCB Co., Ltd., Mastercard, and UnionPay have all been in the crosshairs. Such enterprises using these payment providers face a heightened risk of the attack, according to a report from Silent Push.

    Targeting Major Payment Devices: How Hackers Exploit Vulnerabilities

    The campaign involves highly sophisticated techniques for injecting malicious scripts into e-commerce platforms to harvest sensitive payment information. The attack process manipulates online payment gateways by introducing malicious JavaScript code that records payment card details at the point of transaction.

    Implementing Malicious Scripts: Intricate Techniques

    Hackers implant JavaScript code into e-commerce websites, enabling them to exfiltrate credit card details in real-time. This technique exploits existing vulnerabilities in payment systems to capture data as users input their details during transactions.

    Noteworthy Target Payment Gateways:

    • American Express
    • Diners Club
    • Discover
    • JCB Co., Ltd.
    • Mastercard
    • UnionPay

    Implications for Enterprise Clients: Consequences and Precautions

    Enterprise organizations using these major payment networks can be most affected, facing potential data breaches and financial losses. To mitigate these risks, businesses must apply critical security updates and actively monitor their e-commerce infrastructures.

    Preemptive Protective Measures: Strengthening Security

    Enterprises can fortify their defenses against skimming threats by following a multi-faceted approach:

    1. Regularly update and patch e-commerce platforms.
    2. Employ security solutions that detect and remove malicious scripts.
    3. Conduct frequent security audits and network monitoring.
    4. Implement Content Security Policies (CSP) to limit the execution of unauthorized scripts.

    In vendors’ drive for robust security, these strategies offer a pivotal layer of defense against ongoing exploits targeting payment systems, requiring vigilance and swift action to safeguard consumer data.

    Related Posts