{"id":15362,"date":"2019-05-21T08:10:09","date_gmt":"2019-05-21T16:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/21\/news-9111\/"},"modified":"2019-05-21T08:10:09","modified_gmt":"2019-05-21T16:10:09","slug":"news-9111","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/21\/news-9111\/","title":{"rendered":"Skimmer acts as payment service provider via rogue iframe"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 21 May 2019 15:38:42 +0000<\/strong><\/p>\n<p>Criminals continue to target online stores to steal payment details from unaware customers at a rapid pace. There are many different ways to go about it, from hacking the shopping site itself, to compromising its supply-chain.<\/p>\n<p>A number of online merchants externalize the payment process to a payment service provider (PSP) for various reasons, including peace of mind that transactions will be handled securely. Since some stores will not process payments on their own site, one might think that even if they were compromised, attackers wouldn&#8217;t be able to steal customers&#8217; credit card data.<\/p>\n<p>But this isn&#8217;t always true. <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.riskiq.com\/blog\/labs\/magecart-group-4-always-advancing\/\" target=\"_blank\">RiskIQ previously detailed<\/a> how Magecart&#8217;s Group 4 was using an overlay technique that would search for the active payment form on the page and replace it with one prepped for skimming. <\/p>\n<p>The one we are looking at today adds a bogus iframe that asks unsuspecting customers to enter their credit card information. The irony here is that the shopping site itself wouldn&#8217;t even ask for it, since visitors are normally redirected to the external PSP.<\/p>\n<h3>Skimmer injects its own credit card fields<\/h3>\n<p>Small and large online retailers must adhere to security requirements from <a rel=\"noreferrer noopener\" aria-label=\"Payment Card Industry Data Security (opens in a new tab)\" href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_blank\">Payment Card Industry Data Security<\/a> (PCI-DSS) that go well beyond using SSL for their payment forms. Failing to do so can lead to large fines and even the cancellation of their accounts.<\/p>\n<p>One of the most popular e-commerce platforms, Magento, can help merchants be <a rel=\"noreferrer noopener\" aria-label=\"PCI compliant (opens in a new tab)\" href=\"https:\/\/magento.com\/pci-compliance\" target=\"_blank\">PCI compliant<\/a> via its <a rel=\"noreferrer noopener\" aria-label=\"Magento Commerce (opens in a new tab)\" href=\"https:\/\/magento.com\/products\/magento-commerce\" target=\"_blank\">Magento Commerce<\/a> cloud product or integrated payment gateways and hosted forms without sensitive data flowing through or stored on the Magento application server itself.<\/p>\n<p>During one of our web crawls, we spotted suspicious activity from a Magento site and decided to investigate further. The following image depicts two slightly different checkout pages based on the same platform, with the one on the right being the suspicious site we had identified.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/compare.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38714\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/attachment\/compare-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/compare.png\" data-orig-size=\"718,511\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"compare\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/compare-300x214.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/compare-600x427.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/compare.png\" alt=\"\" class=\"wp-image-38714\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/compare.png 718w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/compare-300x214.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/compare-600x427.png 600w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/a><figcaption>On the left, the expected payment form; on the right the one with a rogue iframe.<\/figcaption><\/figure>\n<\/div>\n<p>What we notice are new fields to enter credit card data that did no exist on the left (untampered form). By itself, this may not be out of the ordinary since online merchants do use such forms (including iframes) as part of their checkout pages.<\/p>\n<p>But there are some things that just don&#8217;t add up here. For example, right below the credit card field is text that says, &#8220;<em>Then you will be redirected to PayuCheckout website when you place an order.<\/em>&#8221; Why would a merchant want to get their customers to type in their credit card again and hurt their conversion rate?<\/p>\n<p>And indeed the unsuspecting shopper will then be taken to another\u2014 legitimate this time\u2014payment form to re-enter their credit card details. This should be an immediate red flag if you have to type in your information twice. This is the kind of scenario we typically see with phishing sites as well.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/payu.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38722\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/attachment\/payu\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/payu.png\" data-orig-size=\"710,521\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"payu\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/payu-300x220.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/payu-600x440.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/payu.png\" alt=\"\" class=\"wp-image-38722\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/payu.png 710w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/payu-300x220.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/payu-600x440.png 600w\" sizes=\"(max-width: 710px) 100vw, 710px\" \/><\/a><figcaption>The legitimate (external) payment form<\/figcaption><\/figure>\n<\/div>\n<p>At this point, we know that this e-commerce site is yet another victim that fell into the hands of one the Magecart groups. In the following section, we look into at how this attack works.<\/p>\n<h3>A three-step exfiltration process<\/h3>\n<p>The Magento site has been hacked and malicious code injected into all of its pages. However, the most important one that we are going to look at is the actual checkout page.<\/p>\n<p>The crooks first load their own innocuous iframe to collect the credit card data, which is then validated before being exfiltrated.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38721\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/attachment\/traffic_capture\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture.png\" data-orig-size=\"631,172\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic_capture\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture-300x82.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture-600x164.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture.png\" alt=\"\" class=\"wp-image-38721\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture.png 631w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture-300x82.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture-600x164.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/traffic_capture-630x172.png 630w\" sizes=\"(max-width: 631px) 100vw, 631px\" \/><\/a><figcaption>Traffic capture showing the steps involved in credit card theft<\/figcaption><\/figure>\n<\/div>\n<p>As we mentioned, injected code is present in all the PHP pages of that site, but it will only trigger if the current URL in the address bar is the shopping cart checkout page (<em>onestepcheckout<\/em>). Some extra checks (screen dimensions and presence of a web debugger) are also performed before continuing.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/checks.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38716\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/attachment\/checks-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/checks.png\" data-orig-size=\"650,433\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"checks\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/checks-300x200.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/checks-600x400.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/checks.png\" alt=\"\" class=\"wp-image-38716\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/checks.png 650w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/checks-300x200.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/checks-600x400.png 600w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption>Injected snippet that checks for certain elements before loading the full skimmer<\/figcaption><\/figure>\n<\/div>\n<p>If the right conditions are met, an external piece of JavaScript is loaded from <em>thatispersonal[.]com<\/em>, a domain registered with REGISTRAR OF DOMAIN NAMES REG.RU LLC and hosted in Russia.<\/p>\n<p>It&#8217;s worth noting that directly browsing to this URL without the correct referer (one of the hacked Magento sites) will return a decoy script instead. The complete script is largely obfuscated and creates the iframe-box we saw above for harvesting credit card details at the right place on screen.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/loadiframe.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38717\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/attachment\/loadiframe\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/loadiframe.png\" data-orig-size=\"631,670\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"loadiframe\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/loadiframe-283x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/loadiframe-565x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/loadiframe.png\" alt=\"\" class=\"wp-image-38717\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/loadiframe.png 631w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/loadiframe-283x300.png 283w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/loadiframe-565x600.png 565w\" sizes=\"(max-width: 631px) 100vw, 631px\" \/><\/a><figcaption>The rogue, previously non-existent credit card fields<\/figcaption><\/figure>\n<\/div>\n<p>It also loads another long and yet again obfuscated script (<em>[hackedsite]_iframe.js<\/em>) where &#8220;hackedsite&#8221; is the name of the e-commerce site that was hacked. Its job is to process, validate, and then exfiltrate the user data.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/validate.png\" data-rel=\"lightbox-5\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38718\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/attachment\/validate\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/validate.png\" data-orig-size=\"646,691\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"validate\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/validate-280x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/validate-561x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/validate.png\" alt=\"\" class=\"wp-image-38718\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/validate.png 646w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/validate-280x300.png 280w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/validate-561x600.png 561w\" sizes=\"(max-width: 646px) 100vw, 646px\" \/><\/a><figcaption>A familiar sight, with data elements to be scraped and exiltrated<\/figcaption><\/figure>\n<\/div>\n<p>That data is sent via a POST request to the same malicious domain in a custom encoded format.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/exfiltrate.png\" data-rel=\"lightbox-6\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38719\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/attachment\/exfiltrate\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/exfiltrate.png\" data-orig-size=\"662,384\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"exfiltrate\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/exfiltrate-300x174.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/exfiltrate-600x348.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/exfiltrate.png\" alt=\"\" class=\"wp-image-38719\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/exfiltrate.png 662w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/exfiltrate-300x174.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/exfiltrate-600x348.png 600w\" sizes=\"(max-width: 662px) 100vw, 662px\" \/><\/a><figcaption>The network request that exfiltrates the stolen data<\/figcaption><\/figure>\n<\/div>\n<h3>The diversity of skimmers and attacks<\/h3>\n<p>This particular skimmer evolved slightly over time and wasn&#8217;t always used for the rogue iframe technique. Historical scans archived on urlscan.io show some changes with obfuscation going from a <a rel=\"noreferrer noopener\" aria-label=\"hex encoded array (opens in a new tab)\" href=\"https:\/\/urlscan.io\/responses\/226686abf3bba5e6ecf2a2a8416d4b3b087e4e82f5f7d1af3f97191447cae168\/\" target=\"_blank\">hex encoded array<\/a> to <a rel=\"noreferrer noopener\" aria-label=\"string manipulation (opens in a new tab)\" href=\"https:\/\/urlscan.io\/responses\/ddc9108f0ddd6e3d10f314aa2e33d8a97aec19c1fe4bcd94ffca481d20bec255\/\" target=\"_blank\">string manipulation<\/a> using split and join methods.<\/p>\n<p>Criminals have many different ways of stealing data from online shoppers with web skimmers. While supply-chain attacks are the most damaging because they usually affect a larger number of stores, they are also more difficult to pull off.<\/p>\n<p>Compromising vulnerable e-commerce sites via automated attacks is the most common approach. Once the skimmer is injected into the payment page, it can steal any data that is entered and immediately send it to the crooks. As we have seen in this article, even e-commerce sites that do not collect payment data themselves can be affected when the attackers inject previously non-existent credit card fields into the checkout page.<\/p>\n<p>For online shoppers, this trick will be difficult to spot early on and perhaps only after being prompted for the same information again will they become suspicious.<\/p>\n<p>While it is important for e-commerce sites to get remediated in order to prevent further theft, we know this process can be delayed for one reason or another. This is why we focus on the exfiltration gates to protect our customers in the event that they happen to be shopping on a compromised store.<\/p>\n<h3>Further reading<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.riskiq.com\/blog\/external-threat-management\/inside-magecart\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Inside Magecart (opens in a new tab)\">Inside Magecart<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Introduction to Magento Security (opens in a new tab)\" href=\"https:\/\/sucuri.net\/guides\/magento-security\" target=\"_blank\">Introduction to Magento Security<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Magento's approach to PCI compliance (opens in a new tab)\" href=\"https:\/\/magento.com\/pci-compliance\" target=\"_blank\">Magento&#8217;s approach to PCI compliance<\/a><\/li>\n<\/ul>\n<h3>Indicators of Compromise (IoCs)<\/h3>\n<p>thatispersonal[.]com<br \/>82.146.50[.]133<br \/>top5value[.]com<br \/>212.109.222[.]250<br \/>voodoo4tactical[.]com<br \/>212.109.222[.]249<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/\">Skimmer acts as payment service provider via rogue iframe<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 21 May 2019 15:38:42 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/' title='Skimmer acts as payment service provider via rogue iframe'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/shutterstock_701873641.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Even e-commerce sites that do not take payment information themselves can be abused by crooks. In this post, we show how a web skimmer is able to inject an artificial iframe into the checkout page to prompt users for their credit card information. Victims will only realize something&#8217;s not right when they are redirected to the real (and external) payment form.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/credit-card\/\" rel=\"tag\">credit card<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/e-commerce\/\" rel=\"tag\">e-commerce<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacked-website\/\" rel=\"tag\">hacked website<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacking\/\" rel=\"tag\">hacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iframe\/\" rel=\"tag\">iframe<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magento\/\" rel=\"tag\">magento<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmer\/\" rel=\"tag\">skimmer<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/' title='Skimmer acts as payment service provider via rogue iframe'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/\">Skimmer acts as payment service provider via rogue iframe<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14702,4503,17476,21838,3919,11159,19622,12370,3764,3924,19623],"class_list":["post-15362","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-credit-card","tag-cybercrime","tag-e-commerce","tag-hacked-website","tag-hacking","tag-iframe","tag-magecart","tag-magento","tag-malware","tag-phishing","tag-skimmer"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15362"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15362\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15362"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}