{"id":17094,"date":"2019-12-04T09:10:04","date_gmt":"2019-12-04T17:10:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/12\/04\/news-10830\/"},"modified":"2019-12-04T09:10:04","modified_gmt":"2019-12-04T17:10:04","slug":"news-10830","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/04\/news-10830\/","title":{"rendered":"There&#8217;s an app for that: web skimmers found on PaaS Heroku"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 04 Dec 2019 16:00:00 +0000<\/strong><\/p>\n<p>Criminals love to abuse legitimate services\u2014especially platform-as-a-service (Paas) cloud providers\u2014as they are a popular and reliable hosting commodity used to support both business and consumer ventures.<\/p>\n<p>Case in point, in April 2019 we <a rel=\"noreferrer noopener\" aria-label=\"documented (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/\" target=\"_blank\">documented<\/a> a web skimmer served on code repository GitHub. Later on in June, we <a rel=\"noreferrer noopener\" aria-label=\"observed (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/magecart-skimmers-found-on-amazon-cloudfront-cdn\/\" target=\"_blank\">observed<\/a> a vast campaign where skimming code was injected into Amazon S3 buckets.<\/p>\n<p>This time, we take a look at a rash of skimmers found on <a rel=\"noreferrer noopener\" aria-label=\"Heroku (opens in a new tab)\" href=\"https:\/\/www.heroku.com\/\" target=\"_blank\">Heroku<\/a>, a container-based, cloud PaaS owned by Salesforce. Threat actors are leveraging the service not only to host their skimmer infrastructure, but also to collect stolen credit card data.<\/p>\n<p>All instances of abuse found have already been reported to Heroku and taken down. We would like to thank the Salesforce Abuse Operations team for their swift response to our notification.<\/p>\n<h3>Abusing cloud apps for skimming<\/h3>\n<p>Developers can leverage Heroku to build apps in a variety of languages and deploy them seamlessly at scale.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/heroku_free.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"41441\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/attachment\/heroku_free\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/heroku_free.png\" data-orig-size=\"689,623\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"heroku_free\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/heroku_free-300x271.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/heroku_free-600x543.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/heroku_free.png\" alt=\"\" class=\"wp-image-41441\" width=\"456\" height=\"412\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/heroku_free.png 689w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/heroku_free-300x271.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/heroku_free-600x543.png 600w\" sizes=\"auto, (max-width: 456px) 100vw, 456px\" \/><\/a><\/figure>\n<\/div>\n<p>Heroku has a freemium model, and new users can experiment with the plaform&#8217;s free web hosting services with certain limitations. The crooked part of the Magecart cabal were registering free accounts with Heroku to host their skimming business.<\/p>\n<p>Their web skimming app consists of three components:<\/p>\n<ul>\n<li>The core skimmer that will be injected into compromised merchant sites, responsible for detecting the checkout URL and loading the next component.<\/li>\n<li>A rogue iframe that will overlay the standard payment form meant to harvest the victim&#8217;s credit card data.<\/li>\n<li>The exfiltration mechanism for the stolen data that is sent back in encoded format.<\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/123.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41430\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/attachment\/123\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/123.png\" data-orig-size=\"722,549\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"123\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/123-300x228.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/123-600x456.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/123.png\" alt=\"\" class=\"wp-image-41430\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/123.png 722w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/123-300x228.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/123-600x456.png 600w\" sizes=\"(max-width: 722px) 100vw, 722px\" \/><\/a><\/figure>\n<\/div>\n<h3>iframe trick<\/h3>\n<p>Compromised shopping sites are injected with a single line of code that loads the remote piece of JavaScript. Its goal is to monitor the current page and load a second element (a malicious credit card iframe) when the current browser URL contains the Base64 encoded string <em>Y2hlY2tvdXQ=<\/em> (checkout). <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/victim_site.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41429\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/attachment\/victim_site\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/victim_site.png\" data-orig-size=\"744,439\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"victim_site\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/victim_site-300x177.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/victim_site-600x354.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/victim_site.png\" alt=\"\" class=\"wp-image-41429\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/victim_site.png 744w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/victim_site-300x177.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/victim_site-600x354.png 600w\" sizes=\"(max-width: 744px) 100vw, 744px\" \/><\/a><\/figure>\n<\/div>\n<p>The iframe is drawn above the standard payment form and looks identical to it, as the cybercriminals use the same cascading style sheet (CSS) from <em>portal.apsclicktopay.com\/css\/build\/easypay.min.css<\/em>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/skimmer_iframe.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41428\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/attachment\/skimmer_iframe\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/skimmer_iframe.png\" data-orig-size=\"624,762\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"skimmer_iframe\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/skimmer_iframe-246x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/skimmer_iframe-491x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/skimmer_iframe.png\" alt=\"\" class=\"wp-image-41428\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/skimmer_iframe.png 624w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/skimmer_iframe-246x300.png 246w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/skimmer_iframe-491x600.png 491w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/figure>\n<\/div>\n<p>Finally, the stolen data is exfiltrated, after which victims will receive an error message instructing them to reload the page. This may be because the form needs to be repopulated properly, without the iframe this time.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/error_.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41432\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/attachment\/error_-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/error_.png\" data-orig-size=\"572,396\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"error_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/error_-300x208.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/error_.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/error_.png\" alt=\"\" class=\"wp-image-41432\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/error_.png 572w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/error_-300x208.png 300w\" sizes=\"(max-width: 572px) 100vw, 572px\" \/><\/a><\/figure>\n<\/div>\n<h3>Several Heroku-hosted skimmers found<\/h3>\n<p>This is not the only instance of a credit card skimmer found on Heroku. We identified several others using the same naming convention for their script, all seemingly becoming active within the past week.<\/p>\n<figure class=\"wp-block-embed-twitter aligncenter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Another one on <a href=\"https:\/\/twitter.com\/heroku?ref_src=twsrc%5Etfw\">@heroku<\/a><\/p>\n<p>hxxps:\/\/stark-gorge-44782.herokuapp[.]com\/integration.js. Fake form in an iframe. Data goes to hxxps:\/\/stark-gorge-44782.herokuapp[.]com\/config.php?id= <a href=\"https:\/\/t.co\/Xa1F2z1Z1a\">pic.twitter.com\/Xa1F2z1Z1a<\/a><\/p>\n<p>&mdash; Denis (@unmaskparasites) <a href=\"https:\/\/twitter.com\/unmaskparasites\/status\/1201625226704015367?ref_src=twsrc%5Etfw\">December 2, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>In one case, the threat actors may have forgotten to use obfuscation. The code shows vanilla skimming, looking for specific fields to collect and exfiltrate using the <em>window.btoa(JSON.stringify(result))<\/em> method.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/clear.png\" data-rel=\"lightbox-5\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41445\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/attachment\/clear-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/clear.png\" data-orig-size=\"677,759\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"clear\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/clear-268x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/clear-535x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/clear.png\" alt=\"\" class=\"wp-image-41445\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/clear.png 677w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/clear-268x300.png 268w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/clear-535x600.png 535w\" sizes=\"(max-width: 677px) 100vw, 677px\" \/><\/a><\/figure>\n<\/div>\n<p>We will likely continue to observe web skimmers abusing more cloud services as they are a cheap (even free) commodity they can discard when finished using it.<\/p>\n<p>From a detection standpoint, skimmers hosted on cloud providers may cause some issues with false positives. For example, one cannot blacklist a domain used by thousands of other legitimate users. However, in this case we can easily do full qualified domain (FQDN) detections and block just that malicious user.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/block.png\" data-rel=\"lightbox-6\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41449\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/attachment\/block-11\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/block.png\" data-orig-size=\"524,311\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"block\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/block-300x178.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/block.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/block.png\" alt=\"\" class=\"wp-image-41449\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/block.png 524w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/block-300x178.png 300w\" sizes=\"(max-width: 524px) 100vw, 524px\" \/><\/a><\/figure>\n<\/div>\n<h3>Indicators of Compromise (IOCs)<\/h3>\n<p><strong>Skimmer hostnames on Heroku<\/strong><\/p>\n<p>ancient-savannah-86049[.]herokuapp.com<br \/>pure-peak-91770[.]herokuapp[.]com<br \/>aqueous-scrubland-51318[.]herokuapp[.]com<br \/>stark-gorge-44782.herokuapp[.]com<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/\">There&#8217;s an app for that: web skimmers found on PaaS Heroku<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 04 Dec 2019 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/' title='There's an app for that: web skimmers found on PaaS Heroku'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_163050257.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Cybercriminals are abusing platform-as-a-service (PaaS) cloud provider Heroku to build web skimming apps and steal customer data.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/web-threats\/\" rel=\"category tag\">Web threats<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/app\/\" rel=\"tag\">app<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apps\/\" rel=\"tag\">apps<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/credit-card\/\" rel=\"tag\">credit card<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/heroku\/\" rel=\"tag\">heroku<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/paas\/\" rel=\"tag\">paas<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmer\/\" rel=\"tag\">skimmer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmers\/\" rel=\"tag\">skimmers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimmers\/\" rel=\"tag\">web skimmers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimming\/\" rel=\"tag\">web skimming<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/' title='There's an app for that: web skimmers found on PaaS Heroku'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/12\/theres-an-app-for-that-web-skimmers-found-on-paas-heroku\/\">There&#8217;s an app for that: web skimmers found on PaaS Heroku<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4382,8816,14702,23626,19622,16635,19623,22327,19624,23516,11716],"class_list":["post-17094","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-app","tag-apps","tag-credit-card","tag-heroku","tag-magecart","tag-paas","tag-skimmer","tag-skimmers","tag-web-skimmers","tag-web-skimming","tag-web-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17094"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17094\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17094"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}