FBI Warns Govt Agencies, SMBs to Defend Against E-Skimming Threats

The U.S. Federal Bureau of Investigation (FBI) issued a warning to increase awareness on current e-skimming threats targeting both small and medium-sized businesses and government agencies that process online payments, as well as defense tips to fend them off.

E-skimming (also known as web skimming) is carried out by threat actors who inject malicious code in the form of payment card skimmer scripts within a website's payment processing platform, with the end goal of harvesting and stealing its customers' payment or personally identifiable information (PII).

"The bad actor may have gained access via a phishing attack targeting your employees—or through a vulnerable third-party vendor attached to your company’s server," the FBI says.

Wiz

"Regardless, once he is in, he can load the malicious code and capture the credit card data in real-time as the user enters it. He either then sells the data on the darknet or uses it to make fraudulent purchases himself."

How e-skimming works
How e-skimming works

Defense measures against online skimming

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) provide [1, 2] a set of measures that government agencies and businesses can take to protect themselves against skimming threats:

Update and patch all systems with the latest security software. Anti-virus and anti-malware need to be up-to-date and firewalls strong.
• Change default credentials and create strong, unique passwords on all systems.
Implement multi-factor authentication.
• Educate employees about safe cyber practices. Most importantly, do not click on links or unexpected attachments in messages.
Segregate and segment network systems to limit how easily cybercriminals can move from one to another.

Businesses and agencies that operate e-commerce platforms can also turn on checks on third-party resource integrity via Content Security Policy (CSP) that will only allow JavaScript loading from a trusted list of domains, thus blocking attackers-controlled domains.

Subresource Integrity (SRI) is another option that allows them to prevent loading modified JavaScript code and only enabling legitimate resources using cryptographic hash checks.

Users, however, have a lot fewer options to protect themselves against online skimming attacks. Browser addons designed to completely block loading JavaScript code on untrusted websites are a choice but it doesn't help with whitelisted ones.

E-commerce users can report any suspected attacks to the local FBI office or directly to the FBI's Internet Crime Complaint Center at www.ic3.gov.

Web skimming is here to stay as shown by Magecart

Magecart groups, the most notorious threat actors behind e-skimming attacks, are highly effective cybercrime groups active since at least 2015, with a RiskIQ report saying that it goes back as far as 2010. They focus on Magento-powered e-commerce sites and operate campaigns that are just active as ever four years later, rarely showing any slowdown.

RiskIQ's head of threat research Yonathan Klijnsma said in a report detailing the expansion of Magecart activity to OpenCart ​​​​​​and OSCommerce-powered online stores that "for every Magecart attack that makes headlines, we detect thousands more that we don’t disclose. A considerable portion of these lesser-known breaches involves third-party payment platforms."

"They’re currently focusing on payment data, but we’re already seeing moves to skim login credentials and other sensitive information. This widens the scope of potential Magecart victims far beyond e-commerce alone," also stated Klijnsma in an analysis of a large-scale operation against OpenCart online stores.

Image: RiskIQ

RiskIQ's Magecart report published this month estimates that this threat may have impacted millions of users, with the company's telemetry data showing a total of 2,086,529 instances of Magecart detections.

Magecart groups have been behind a card skimming campaign that successfully breached 962 e-commerce stores, a payment card skimming script injected within the PrismWeb-powered checkout pages of hundreds of online campus stores from U.S. and Canada, and have used an upgraded credit card stealer scripts designed to use an iframe-based phishing system as Malwarebytes security researcher Jérôme Segura discovered in May.

Another Magecart group developed a polymorphic Magecart skimmer script with support for 57 payment gateways that can easily be injected within almost any checkout page of any online shop to automatically start scraping customers' payment info without needing any customization as Sanguine Security researcher Willem de Groot found.

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Related Articles:

CISA orders feds to patch MongoBleed flaw exploited in attacks

FBI and CISA warn of state hackers attacking Fortinet FortiOS servers

FBI: Cybercriminals stole $262M by impersonating bank support teams

Massive surge of NFC relay malware steals Europeans’ credit cards

MongoDB warns admins to patch severe vulnerability immediately