A website seemingly offering images and icons for download is actually a cover-up for a credit card skimming operation, says Malwarebytes.
Cybercriminals use all kinds of tricks to try to legitimize malicious websites, files, emails, and other content in hopes of trapping unsuspecting users. A new malware campaign analyzed by cybersecurity firm Malwarebytes employs a particularly deceptive strategy to empower credit card skimming attacks.
In a card skimming campaign, hackers gain access to an e-commerce site and hide malicious code on that site. When a customer checks out and enters the credit card information to pay for the purchase, the card details are captured by the criminals behind the operation without the user's knowledge.
In a blog post published Wednesday, Malwarebytes described the process through which one particular website is serving as a host for skimming attacks. On the surface, a site named myicons.net looks innocent enough as it offers images and icons for people to download. Among the images available are favicons, which are icons that appear on a website's browser tab as a means of branding or identification.
Upon investigation, though, Malwarebytes discovered that the domain name of myicons.net was registered just a few days prior and hosted on a server previously identified as malicious. Further, myicons.net appropriated all its content from another site named iconarchive.com simply by pointing to that site within an HTML iframe.
Digging further, Malwarebytes found that several e-commerce sites were loading an Adobe Magento favicon from the myicons.net domain. Though the security firm suspected that this favicon was malicious, it was unable to find any extra code inside it. However, it did uncover malicious activity on the e-commerce sites that were loading the Magento favicon from myicons.net.
Instead of serving up an image file, the myicons.net server was actually loading code consisting of a credit card payment form. This form is loaded dynamically and overrides the PayPal checkout option with its own menu for MasterCard, Visa, Discover, and American Express cards. In the end, any credit card information entered through this form is then sent back to the criminals.
Jerome Segura, director of threat intelligence for Malwarebytes, summed up the sophistication of this operation.
Though it relies on the old tactic of card skimming, this particular campaign is fairly new, less than a week old, according to Segura. However, Malwarebytes believes that the criminal group behind it is an established one that is diversifying its operations and running several campaigns at the same time.
Because the campaign is new, it hasn't yet hit a large number of users or sites.
"Like with any ongoing credit card skimming campaign, there are going to be a certain number of victims, typically determined by the size of the operation," Segura said. "We only detected a handful of compromised merchants here, probably due to this having been just rolled out."
Finally, how can website users protect themselves from these types of credit card skimming attacks?
"Web skimming is difficult to protect against because it can affect just about any brand and is invisible to the user," Segura said. "However, you can limit exposure by choosing certain types of payments that do not involve typing out your credit card number each time. Additionally, we recommend web content filtering provided by some security vendors to block known skimming infrastructure."
- How to become a cybersecurity pro: A cheat sheet (TechRepublic)
- Kubernetes security guide (free PDF) (TechRepublic download)
- Information security policy (TechRepublic Premium)
- Online security 101: Tips for protecting your privacy from hackers and spies (ZDNet)
- All the VPN terms you need to know (CNET)
- Cybersecurity and cyberwar: More must-read coverage (TechRepublic on Flipboard)