Skimming code is introduced to payment card processing websites by:
- Exploiting a vulnerability in the website’s e-commerce platform
- Gaining access to the victim’s network through a phishing email or brute force of administrative credentials
The malicious code captures credit card data as the user enters it in real time. The information is then sent to an Internet-connected server using a domain name controlled by the actor. Subsequently, the collected credit card information is either sold or used to make fraudulent purchases. Any business accepting online payments on their website is at risk of an e-Skimming attack.
WHAT ARE THE WARNING SIGNS?
- Complaints of fraudulent activity on several customers’ accounts after making a purchase.
- Identifying a new domain not known to be registered.
HOW CAN YOU MINIMIZE RISK?
- Perform regular updates to payment software.
- Install patches from payment platform vendors.
- Keep anti-virus software updated.
- Monitor and analyze web logs.