Targets with the highest return on the least amount of effort are something that every cybercriminal fantasizes about. Enter: credit card skimming.
What’s going on?
A new credit card skimming campaign is targeting websites running ASP.NET; these websites are hosted on Microsoft IIS servers. This campaign started this year in April and has impacted a credit card union, along with health & community associations and sports organizations.
What should you know about it?
No specific JavaScript library is being targeted and the code takes various forms.
All the compromised sites were running ASP.NET 4.0.30319, which is not officially supported and contains a multitude of vulnerabilities.
The skimmer looks for passwords too, alongside credit card numbers.
Recent credit card skimming attacks
Magecart skimmer has been used to compromise websites in the US, hosted by local governments in 8 cities.
Threat actors gained write-access to Claire’s website and injected a JS used by the site with extra code that skimmed customers and payment details from online purchasers.
In February, the financial information of Carson City residents was compromised due to a security vulnerability on its third-party vendor's online payment system, Click2Gov.
The bottom line
Credit card skimming is a popular activity for cybercriminals and is not expected to stop any time soon. Moreover, during this pandemic season, there has been a rise in online shopping; thus, increasing business for threat actors. Thus, organizations and associations are suggested to keep their payment portals secure.