Cyware Social will be sunset on April 15, 2026. The service is being replaced by Cyware's Daily Threat Intel Briefs,
offering curated security advisories on the latest threats. Enterprise users can contact us here → for more details.

Targets with the highest return on the least amount of effort are something that every cybercriminal fantasizes about. Enter: credit card skimming.

What’s going on?

A new credit card skimming campaign is targeting websites running ASP.NET; these websites are hosted on Microsoft IIS servers. This campaign started this year in April and has impacted a credit card union, along with health & community associations and sports organizations.

What should you know about it?

  • No specific JavaScript library is being targeted and the code takes various forms.
  • All the compromised sites were running ASP.NET 4.0.30319, which is not officially supported and contains a multitude of vulnerabilities.
  • Moreover, these sites also had shopping cart applications, which was the main target of the attackers.
  • The skimmer looks for passwords too, alongside credit card numbers.

Recent credit card skimming attacks

  • Magecart skimmer has been used to compromise websites in the US, hosted by local governments in 8 cities.
  • Threat actors gained write-access to Claire’s website and injected a JS used by the site with extra code that skimmed customers and payment details from online purchasers.
  • In February, the financial information of Carson City residents was compromised due to a security vulnerability on its third-party vendor's online payment system, Click2Gov.

The bottom line

Credit card skimming is a popular activity for cybercriminals and is not expected to stop any time soon. Moreover, during this pandemic season, there has been a rise in online shopping; thus, increasing business for threat actors. Thus, organizations and associations are suggested to keep their payment portals secure.


Cyware Publisher

Publisher

Cyware