{"id":16953,"date":"2019-11-21T10:10:16","date_gmt":"2019-11-21T18:10:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/21\/news-10690\/"},"modified":"2019-11-21T10:10:16","modified_gmt":"2019-11-21T18:10:16","slug":"news-10690","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/21\/news-10690\/","title":{"rendered":"Web skimmer phishes credit card data via rogue payment service platform"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 21 Nov 2019 17:30:00 +0000<\/strong><\/p>\n<p>Heading into the <a rel=\"noreferrer noopener\" aria-label=\"holiday shopping season (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/10-tips-safe-online-shopping-cyber-monday\/\" target=\"_blank\">holiday shopping season<\/a>, we have been tracking increased activity from a threat group registering domains for skimming and phishing campaigns. While most of the campaigns implemented a web skimmer in the typical fashion\u2014grabbing and exfiltrating data from a merchant&#8217;s checkout page to an attacker-controlled server\u2014a new attack scheme has emerged that tricks users into believing they&#8217;re using a payment service platform (PSP).<\/p>\n<p>PSPs are quite common and work by redirecting the user from a (potentially compromised) merchant site onto a secure page maintained by the payment processing company. This is not the first time a web skimmer has <a rel=\"noreferrer noopener\" aria-label=\"attempt to interfere with PSPs (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/05\/skimmer-acts-as-payment-service-provider-via-rogue-iframe\/\" target=\"_blank\">attempted to interfere with PSPs<\/a>, but in this case, the attackers created a completely separate page that mimics a PSP.<\/p>\n<p>By blending phishing and skimming together, threat actors developed a devious scheme, as unaware shoppers will leak their credentials to the fraudsters without thinking twice.<\/p>\n<h3>Standard skimmer<\/h3>\n<p>Over the past few months, we&#8217;ve tracked a group that has been active with web skimmer and phishing templates. As web security firm <a rel=\"noreferrer noopener\" aria-label=\"Sucuri noted (opens in a new tab)\" href=\"https:\/\/labs.sucuri.net\/skimmers-and-phishing\/\" target=\"_blank\">Sucuri noted<\/a>, most of the domains are registered via the medialand.regru@gmail[.]com email address.<\/p>\n<p>Many of their skimmers are loaded as a fake Google Analytics library called <em>ga.js<\/em>. One of several newly-registered domain names we came across had a skimmer that fit the same template, hosted at payment-<em>mastercard[.]com\/ga.js<\/em>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/skimmers_.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41229\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/attachment\/skimmers_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/skimmers_.png\" data-orig-size=\"618,691\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"skimmers_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/skimmers_-268x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/skimmers_-537x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/skimmers_.png\" alt=\"\" class=\"wp-image-41229\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/skimmers_.png 618w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/skimmers_-268x300.png 268w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/skimmers_-537x600.png 537w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><\/a><figcaption>Figure 1: Simple skimmer based on previous template<\/figcaption><\/figure>\n<\/div>\n<p>This malicious <em>ga.js<\/em> file is injected into compromised online shops by inserting a one line piece of code containing the remote script in Base64 encoded form.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/injected_code.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41235\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/attachment\/injected_code-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/injected_code.png\" data-orig-size=\"691,323\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"injected_code\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/injected_code-300x140.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/injected_code-600x280.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/injected_code.png\" alt=\"\" class=\"wp-image-41235\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/injected_code.png 691w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/injected_code-300x140.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/injected_code-600x280.png 600w\" sizes=\"(max-width: 691px) 100vw, 691px\" \/><\/a><figcaption>Figure 2: A JavaScript library from a compromised shop injected with the skimmer<\/figcaption><\/figure>\n<\/div>\n<p>However, one thing we noticed is that the <em>payment-mastercard[.]com<\/em> domain was also hosting a completely different kind of skimmer that at first resembled a phishing site.<\/p>\n<h3 id=\"mce_29\">Phish-like skimmer<\/h3>\n<p>This skimmer is interesting because it looks like a phishing page copied from an official template for <a rel=\"noreferrer noopener\" aria-label=\"CommWeb (opens in a new tab)\" href=\"https:\/\/www.commbank.com.au\/business\/merchant-services\/commweb.html\" target=\"_blank\">CommWeb<\/a>, a payments acceptance service offered by Australia&#8217;s Commonwealth Bank (<em>https:\/\/migs.mastercard.com.au<\/em>).<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/templates.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41222\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/attachment\/templates\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/templates.png\" data-orig-size=\"1401,738\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"templates\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/templates-300x158.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/templates-600x316.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/templates.png\" alt=\"\" class=\"wp-image-41222\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/templates.png 1401w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/templates-300x158.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/templates-600x316.png 600w\" sizes=\"(max-width: 1401px) 100vw, 1401px\" \/><\/a><figcaption>Figure 3: Fraudulent and legitimate payment gateways shown side by side<\/figcaption><\/figure>\n<\/div>\n<p>As the text reads &#8220;<em>Your details will be sent to and processed by The Commonwealth Bank of Australia and will not be disclosed to the merchant<\/em>&#8221; this is not a login page to phish credentials, but rather a pretend payment gateway service.<\/p>\n<p>The attackers have crafted it specifically for an Australian store running the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.prestashop.com\/en\" target=\"_blank\">PrestaShop<\/a> Content Management System (CMS), exploiting the fact that it accepts payments via the Commonwealth Bank.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/banner.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41237\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/attachment\/banner-75\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/banner.png\" data-orig-size=\"450,251\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"banner\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/banner-300x167.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/banner.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/banner.png\" alt=\"\" class=\"wp-image-41237\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/banner.png 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/banner-300x167.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/a><figcaption>Figure 4: Modes of payments accepted by the store<\/figcaption><\/figure>\n<\/div>\n<p>The scheme consists of swapping the legitimate e-banking page with the fraudulent one in order to collect the victims&#8217; credit card details. We also noticed that the fake page did something we don&#8217;t always see with standard skimmers in that it checked that all fields were valid and informed the user if they weren&#8217;t.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/fake.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41228\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/attachment\/fake-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/fake.png\" data-orig-size=\"695,754\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fake\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/fake-277x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/fake-553x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/fake.png\" alt=\"\" class=\"wp-image-41228\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/fake.png 695w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/fake-277x300.png 277w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/fake-553x600.png 553w\" sizes=\"(max-width: 695px) 100vw, 695px\" \/><\/a><figcaption>Figure 5: Fake payment gateway page shown with its JavaScript that exfiltrates the data<\/figcaption><\/figure>\n<\/div>\n<p>Here&#8217;s how this works:<\/p>\n<ul>\n<li>The fraudulent page will collect the credit card data entered by the victim and exfiltrate it via the <em>payment-mastercard[.]com\/ga.php?analytic={based64}<\/em> URL<\/li>\n<li>Right after, the victim is redirected to the real payment processor via the merchant&#8217;s migs_vpc module (<a rel=\"noreferrer noopener\" aria-label=\"MIGs VPC (opens in a new tab)\" href=\"https:\/\/www.prestashop.com\/forums\/topic\/146990-module-migs-vpc-payment-module\/\" target=\"_blank\">MIGs VPC<\/a> is an integrated payment service)<\/li>\n<li>The legitimate payment site for Australia&#8217;s Commonwealth Bank is loaded and displays the total amount due for the purchase.<\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/flow.png\" data-rel=\"lightbox-5\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41227\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/attachment\/flow-40\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/flow.png\" data-orig-size=\"745,610\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"flow\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/flow-300x246.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/flow-600x491.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/flow.png\" alt=\"\" class=\"wp-image-41227\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/flow.png 745w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/flow-300x246.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/flow-600x491.png 600w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/a><figcaption>Figure 6: Web traffic showing data exfiltration process followed by redirect to legitimate PSP<\/figcaption><\/figure>\n<\/div>\n<p>Here&#8217;s the final (and legitimate) payment page displayed to the victim. Note how the total amount due from the purchase on the compromised shop is carried over. This is done by creating a unique session ID and reading browser cookies.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/real_payment.png\" data-rel=\"lightbox-6\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41261\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/attachment\/real_payment\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/real_payment.png\" data-orig-size=\"700,748\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"real_payment\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/real_payment-281x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/real_payment-561x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/real_payment.png\" alt=\"\" class=\"wp-image-41261\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/real_payment.png 700w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/real_payment-281x300.png 281w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/real_payment-561x600.png 561w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><figcaption>Figure 7: Legitimate payment gateway page used for actual payment of goods<\/figcaption><\/figure>\n<\/div>\n<h3>Web skimming in all different forms<\/h3>\n<p>Web skimming is a profitable criminal enterprise that shows no sign of slowing down, sparking authorities&#8217; <a rel=\"noreferrer noopener\" aria-label=\"attention (opens in a new tab)\" href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/portland\/news\/press-releases\/oregon-fbi-tech-tuesday-building-a-digital-defense-agaist-e-skimming\" target=\"_blank\">attention and action plans.<\/a><\/p>\n<p>Externalizing payments shifts the burden and risk to the payment company such that even if a merchant site were hacked, online shoppers would be redirected to a different site (i.e. Paypal, MasterCard, Visa gateways) where they could enter their payment details securely.<\/p>\n<p>Unfortunately, fraudsters are becoming incredibly creative in order to defeat those security defenses. By combining phishing-like techniques and inserting themselves in the middle, they can fool everyone.<\/p>\n<p><a href=\"http:\/\/www.malwarebytes.com\/pricing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Malwarebytes users<\/a> are already protected against this particular scheme as the fraudulent infrastructure was already known to us.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p>payment-mastercard[.]com<br \/> google-query[.]com<br \/> google-analytics[.]top<br \/> google-smart[.]com<br \/> google-smart[.]com<br \/> google-payment[.]com<br \/> jquery-assets[.]com<br \/> sagepay-live[.]com<br \/> google-query[.]com<br \/> payment-sagepay[.]com<br \/> payment-worldpay[.]com<\/p>\n<p>124.156.34[.]157<br \/>47.245.55[.]198<br \/>5.53.124[.]235<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/\">Web skimmer phishes credit card data via rogue payment service platform<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 21 Nov 2019 17:30:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/' title='Web skimmer phishes credit card data via rogue payment service platform'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_223094779.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Threat actors combine phishing with a web skimmer to create a devious scheme designed to lift credit card data from unaware shoppers.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/web-threats\/\" rel=\"category tag\">Web threats<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/holiday-shopping\/\" rel=\"tag\">holiday shopping<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/payment-gateway-service\/\" rel=\"tag\">payment gateway service<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/payment-service-platform\/\" rel=\"tag\">payment service platform<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/payment-service-platforms\/\" rel=\"tag\">payment service platforms<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing-page\/\" rel=\"tag\">phishing page<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/psps\/\" rel=\"tag\">PSPs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/standard-skimmer\/\" rel=\"tag\">standard skimmer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimmer\/\" rel=\"tag\">web skimmer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimmers\/\" rel=\"tag\">web skimmers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimming\/\" rel=\"tag\">web skimming<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/' title='Web skimmer phishes credit card data via rogue payment service platform'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/\">Web skimmer phishes credit card data via rogue payment service platform<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11033,19622,23509,23510,23511,3924,23512,23513,23514,23515,19624,23516,11716],"class_list":["post-16953","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-holiday-shopping","tag-magecart","tag-payment-gateway-service","tag-payment-service-platform","tag-payment-service-platforms","tag-phishing","tag-phishing-page","tag-psps","tag-standard-skimmer","tag-web-skimmer","tag-web-skimmers","tag-web-skimming","tag-web-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16953"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16953\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16953"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}