Attackers Hide Credit Card Skimmers In Image Files To Steal Data

TCM bank hacked

Card skimming attacks have long been a menace for the e-commerce industry. Recently, another attack strategy has surfaced online where the attackers hide credit card skimmers in image files flooding the websites.

Credit Card Skimmers In Image Files

Reportedly, Malwarebytes has discovered a new type of card skimming attacks. In this method, the attackers hide the credit card skimmers in the metadata of image files. Consequently, these malicious images facilitate the attackers in stealing customers’ data. They have shared the details of their findings in a blog post.

Briefly, in this strategy, the attackers exploit a form of steganography – a process of embedding malicious payloads in images.

Though exploiting images for malicious purposes is nothing new. Yet, what’s different here is the use of image files not only to spread the malware but also to steal data.

The attack caught the researchers’ attention after they noticed a malicious image on a WordPress website using the WooCommerce Plugin.

A closer examination of the image then revealed that the attackers have embedded malicious code in the image’s EXIF metadata. This malicious code imports a favicon file from another domain, which bears the card skimmer code in the Copyright tag of its metadata.

The malicious JavaScript code, upon loading on the target website, also grabs information from the input fields of the site. Hence, it steals customers’ names, billing details, and any other data, encoding them with Base64 coupled with reverse-string.

However, it doesn’t send this stolen information to the C&C server as a text. Rather, the malware transmits it as an image file via a POST request.

Connection With Magecart Group 9

Further analysis of the malware lets the researchers establish a link between the new skimming attack and other skimmers. Precisely, they could relate the campaign to Magecart group 9 due to the similarities of host and registrar.

Once again, WordPress site owners and the admins of online stores need to remain very careful about the security of their sites. Make sure to have all the plugins updated, all bugs patched, and use robust website security solutions to stay safe.

Related posts

Hard-Coded Credentials Vulnerability Found In Kubernetes Image Builder

Critical Vulnerability Patched In Jetpack WordPress Plugin

Astaroth Banking Malware Runs Actively Targets Users In Brazil