Categories: Ad Guardian PlusNews

Skimming attack with phishing techniques

A new digital skimming attack borrows phishing techniques and steals card data from fake payments page. Attackers used the secure payment pages, from third-party payment service providers, and inserted digital skimming code. They used fake Google Analytics library (ga.js), according to Malwarebytes.

Director of threat intelligence, Jérôme Segura, discovered a fake payment-mastercard[.]com domain. This was “hosting a completely different kind of skimmer that at first resembled a phishing site.”

This skimmer is interesting because it looks like a phishing page copied from an official template for CommWeb, a payments acceptance service offered by Australia’s Commonwealth Bank,” he explained. “The attackers have crafted it specifically for an Australian store running the PrestaShop Content Management System (CMS), exploiting the fact that it accepts payments via the Commonwealth Bank.”

Moreover, the fake payments page even alerts users if any fields they fill in are invalid.

After steeling victim’s details, they land on the real payment processor. The real Australian Commonwealth Bank site displayed along with the correct total amount due for purchase. This is possible by creating a unique session ID and reading browser cookies, Segura explained.

Externalizing payments shifts the burden and risk to the payment company such that even if a merchant site were hacked, online shoppers would be redirected to a different site (i.e. Paypal, MasterCard, Visa gateways) where they could enter their payment details securely,” he concluded.

Unfortunately, fraudsters are becoming incredibly creative in order to defeat those security defenses. By combining phishing-like techniques and inserting themselves in the middle, they can fool everyone.”

How the skimming attack works

The skimming attack is, thus, more dangerous than the previous ones. Here is the method it uses:  

  • The fake page collects the credit card data filled in by the victim. Then, it steals the data via the payment-mastercard rcard[.]com/ga.php?analytic={based64} URL.
  • Afterwards, the victim lands on the real payment processor.
  • In the end, the legitimate site for Australia’s Commonwealth Bank loads and displays the total amount due for the purchase.
Laurentiu Titei

View Comments

Recent Posts

Computer Runs Slowly? Here Are the Tips to Speed Up Windows PC

Have you noticed that your computer runs slowly? Are you frustrated by frequent system freezes,…

3 days ago

How to Fix Wifi Network Not Showing Up on Windows PC

If you're encountering the Wifi network not showing up on laptop error on your Windows…

6 days ago

Guide on How to Fix Fatal System Error in Windows 10

Are you encountering a Fatal System error in Windows 10? Don’t worry, try these simple…

7 days ago

Update Graphics Drivers in Windows 11,10, 8 & 7 (Manually & Automatic)

Refer to our guide to learn manual and automatic ways to download, install, and update…

1 week ago

Epson Printer Driver Download and Update for Windows 10, 11

A correct Epson printer driver facilitates smooth printing performance. Hence, you can continue reading this…

2 weeks ago

Halo Infinite Keeps Crashing on Windows PC: Fixed

If you are also facing the Halo Infinite crashing error on your Windows PC, then…

2 weeks ago