• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

Fake CDNs obscuring credit card fraudsters

February 26, 2020
Share on FacebookShare on Twitter

Cyber criminals are attempting to steal the personal details of online shoppers without being spotted by disguising credit card skimmers behind fake content delivery networks (CDNs), in a new technique uncovered and described by Malwarebytes researcher Jérôme Segura, who identified suspicious code lurking on the website of a popular French boutique.

“Sometimes, what looks like a CDN [content delivery network] may turn out to be anything but,” said Segura. “Using lookalike domains is nothing new among malware authors. One trend we see a fair bit with web skimmers in particular is domains that mimic Google Analytics. Practically all websites use this service for their ranking and statistics, so it makes for very credible copycats.

“The latest case we caught uses two different domains pretending to be a CDN,” he said. “While typically the second piece of the infrastructure is used for data exfiltration, it only acts as an intermediary that attempts to hide the actual exfiltration server.

“Oddly, the crooks decided to use a local web server exposed to the internet via the free ngrok service to collect the stolen data. This combination of tricks and technologies shows us that fraudsters can devise very customised schemes in an attempt to evade detection,” said Segura.

The compromised e-commerce site contained code that to the naked eye appeared to be merely a jQuery library loaded from a third-party CDN. Both would seem to be legitimate, but on closer inspection it revealed some inconsistencies: notably a field looking for a credit card number, which should not exist for such a plugin, suggesting it may in fact be a skimmer.

Segura checked an archived copy of the site and compared it with the code on the live version, and found that a few weeks earlier, the script had not been present, meaning it was either added recently by the site owner or injected by attackers.

The script works by checking for the current URL in the user’s browser address bar, and if it matches with the store’s checkout page, it would begin collecting form data, such as names, addresses, emails, phone numbers and credit card information.

Once collected, the skimmer exfiltrates data to another location, although Segura actually found this to be an intermediary – a simple redirect revealed the actual destination, a custom ngrok server. Ngrok is a free service that exposes local servers to the public internet – legitimate uses include testing websites and mobile apps without deploying them, or running personal cloud services from home.

Malwarebytes said this was clearly an attempt by the cyber criminals responsible to mask their activity and widen the small window of opportunity they would have had before the exploit was spotted and stopped.

“We caught this campaign early on, and at the time only a handful of sites had been injected with the skimmer,” said Segura. “We reported it to the affected parties while also making sure Malwarebytes users were protected against it.

“While these breaches hurt the reputation of online merchants, customers also suffer the consequences of a hack. Not only do they have to go through the hassle of getting new credit cards, their identities are stolen as well, opening the door to future phishing attacks and impersonation attempts,” he said.

Next Post

Best Amazon Fire TV Stick in 2020

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • City Hunter Review – Does The World NEED More City Hunter? – Pixel Byte
  • Wordle today: The answer and hints for March 6, 2026
  • 6 of the coolest display innovations I saw from TCL at MWC, and some of them could be in your next phone
  • The Soundcore AeroClip earbuds just got a $60 discount — but it won’t be around for long
  • How to unblock Pornhub for free in Mississippi

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously