A card-skimming scheme involving a retailer’s third-party payment service platform (PSP) was revealed by researchers from the security firm Malwarebytes. Here, hackers created a phishing page to swap it with the genuine PSP processing page.
What happened?
Many e-commerce websites outsource their financial transactions to a secure page operated by payment service providers (PSPs).
The researchers came across a newly registered malicious domain, “payment-mastercard[.]com,” that contained a skimmer like this one, as well as the more unique one that imitates the PSP.
How it works?
Jerome Segura, Director of Threat Intelligence at Malwarebytes, noted that the page was hand-crafted specifically for an Australian store that runs the PrestaShop Content Management System (CMS) and uses the Commonwealth Bank platform to accept payments.
“By blending phishing and skimming together, threat actors developed a devious scheme, as unaware shoppers will leak their credentials to the fraudsters without thinking twice,” Segura states.
Who is behind this?
Malwarebytes researchers suggested that the scam appears to be the brainchild of a cybercriminal group skilled in using phishing templates and web skimmers, including a skimmer called ga.js, which’s loaded as a fake Google Analytics library.
“Externalizing payments shifts the burden and risk to the payment company such that even if a merchant site were hacked, online shoppers would be redirected to a different site (i.e. Paypal, MasterCard, Visa gateways) where they could enter their payment details securely,” Segura concludes. “Unfortunately, fraudsters are becoming incredibly creative in order to defeat those security defenses. By combining phishing-like techniques and inserting themselves in the middle, they can fool everyone.”
Publisher