{"id":25681,"date":"2025-01-16T08:10:21","date_gmt":"2025-01-16T16:10:21","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2025\/01\/16\/news-19404\/"},"modified":"2025-01-16T08:10:21","modified_gmt":"2025-01-16T16:10:21","slug":"news-19404","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/01\/16\/news-19404\/","title":{"rendered":"Avery had credit card skimmer stuck on its site for months"},"content":{"rendered":"\n<p>The consequences of a wave of credit card skimmers\u2014which is <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/11\/credit-card-skimming-on-the-rise-for-the-holiday-shopping-season\">normal around the holidays<\/a>\u2014are starting to show.<\/p>\n<p>Label maker Avery has filed a <a href=\"https:\/\/www.maine.gov\/agviewer\/content\/ag\/985235c7-cb95-4be2-8792-a1252b4f8318\/1e98225c-b2e1-4690-8182-9a1f75151933.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">data breach notification<\/a>, saying 61,193 people may have had their credit card details stolen.<\/p>\n<p>On December 9, Avery said it became aware of an attack on its systems. An investigation showed that cybercriminals had inserted malicious software that was used to \u201cscrape\u201d credit card information used on its website. This credit card skimmer was active between July 18, 2024, and December 9, 2024.<\/p>\n<p>Avery has <a href=\"\/Malwarebytes\/Malwareblog\/Avery\/Exhibit_A_Customer_Notification.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">sent emails<\/a> to affected customers to let them know their data has been stolen.<\/p>\n<p>The information potentially included:<\/p>\n<ul class=\"wp-block-list\">\n<li>First and last name<\/li>\n<li>Billing and shipping address<\/li>\n<li>Email address<\/li>\n<li>Phone number if provided<\/li>\n<li>Payment card information including CVV number and expiration date<\/li>\n<li>Purchase amount<\/li>\n<\/ul>\n<p>Avery says it has received a number of reports from affected customers who said that they incurred a fraudulent charge and\/or received a phishing email.<\/p>\n<p>A credit card skimmer is a piece of malware that is injected into a website, often through vulnerabilities in the content management system (CMS) or the plugins that the site owner uses.&nbsp;<\/p>\n<p>When visiting a site that has a card skimmer on it, you&#8217;re unlikely to even know it is there. Card skimmers are experts in injecting JavaScript code, especially on web shops which heavily rely on that type of code, which increases the chance that the extra code will not stand out. Sadly, card skimmers are <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/08\/hundreds-of-online-stores-hacked-in-new-campaign\">all too commonplace<\/a>, but there are things you can do to prevent your details being caught by one.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-protect-yourself-from-card-skimmers\">How to protect yourself from card skimmers<\/h2>\n<ul class=\"wp-block-list\">\n<li><strong>Run a security solution and keep it up to date<\/strong>.\u00a0Most antivirus products\u2014including <a href=\"https:\/\/www.malwarebytes.com\/premium\" target=\"_blank\" rel=\"noreferrer noopener\">Malwarebytes Premium<\/a>\u2014offer some kind of web protection that detects malicious domains and IP addresses.<\/li>\n<li><strong>Enable in-browser protection<\/strong>. <a href=\"https:\/\/www.malwarebytes.com\/browserguard\">Malwarebytes Browser Guard<\/a>\u2014a browser extension available for Chrome, Edge, Firefox and Safari\u2014blocks card skimmers. It also stops annoying ads and trackers, warns about breaches, and flags malicious websites. You can see it in action here, blocking a piece of JavaScript hosted on an otherwise legitimate site:<\/li>\n<\/ul>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"815\" height=\"549\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/cc_bg_as_fraud.jpg\" alt=\"Malwarebytes Browser Guard blocks credit card skimmer JavaScript\" class=\"wp-image-147776\" \/><figcaption class=\"wp-element-caption\">Malwarebytes Browser Guard blocks credit card skimmer JavaScript<\/figcaption><\/figure>\n<ul class=\"wp-block-list\">\n<li><strong>Keep an eye on your financial statements<\/strong>. Regularly check your online bank and credit card statements. Flag anything that seems suspicious.<\/li>\n<li><strong>Set up identity and credit monitoring<\/strong>. Identity monitoring alerts you if your personal information is found being illegally traded online, and helps you recover after. Credit monitoring tracks your credit report and borrowing behavior and alerts you if anything changes.\u00a0A breached company may offer this as a service to you (like Avery is), but you can also get\u00a0<a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">different levels of monitoring solutions<\/a>, depending on your individual need.<\/li>\n<\/ul>\n<p>More information on how to act after falling victim to a data breach can be found in our article: <strong><a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/involved-in-a-data-breach-heres-what-you-need-to-know\">Involved in a data breach? Here\u2019s what you need to know<\/a><\/strong>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2025\/01\/avery-had-credit-card-skimmer-stuck-on-its-site-for-months\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Avery has confirmed its website was compromised by a credit card skimmer that potentially affected over 60,000 customers. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32312,32,5897],"class_list":["post-25681","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-avery","tag-news","tag-privacy"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25681"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25681\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}