{"id":48509,"date":"2023-06-26T11:23:25","date_gmt":"2023-06-26T15:23:25","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=48509"},"modified":"2023-06-26T11:23:25","modified_gmt":"2023-06-26T15:23:25","slug":"illicit-code-on-legitimate-sites","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/48509\/","title":{"rendered":"Web skimmers: why are they particularly sneaky and dangerous?"},"content":{"rendered":"<p>There are a few fairly simple rules that can help you protect both yourself and your money from typical scams while online shopping. Here\u2019s what these boil down to:<\/p>\n<ul>\n<li>Don\u2019t send money to personal accounts of strangers on the internet;<\/li>\n<li>Don\u2019t enter your bank card details on suspicious sites;<\/li>\n<li>Always check the web address carefully before leaving your payment details on a website.<\/li>\n<\/ul>\n<p>However, not many folks know that their card details can be hijacked even on legitimate websites. This can happen if the page is infected with web skimmers \u2014 malicious scripts embedded directly in the website code. That\u2019s what we\u2019ll talk about today.<\/p>\n<h2>What are web skimmers?<\/h2>\n<p>Web skimmers were named due to their association with hardware <a href=\"https:\/\/www.kaspersky.com\/blog\/skimmers-part-one\/7223\/\" target=\"_blank\" rel=\"noopener nofollow\">skimmers<\/a> \u2014 stealthy devices that carders install on ATMs or payment terminals to steal card details. Skimmers are hard to notice because they look like regular ATM hardware, so unsuspecting users insert or slide their cards, only to share their payment details with the criminals.<\/p>\n<p>Scammers have long realized they don\u2019t have to tinker with hardware and risk being caught at the scene of the crime. The same result can be achieved much more easily, fully remotely, and with less risk, by writing a snippet of code and embedding it into a website, where it will intercept shoppers\u2019 bank card details and send them to the scammers. That code snippet is called a web skimmer.<\/p>\n<p>Cybercriminals look for vulnerable online stores and other websites that accept card payments, hack them, and install their malicious code without the owners\u2019 noticing it. At this point, their job is done \u2014 now they just need to consolidate the card details into a database, and sell the database on the dark web to other cybercriminals who specialize in stealing money from bank cards.<\/p>\n<h2>Why are web skimmers dangerous?<\/h2>\n<p>Three things make web skimmers especially dangerous.<\/p>\n<p>First, they\u2019re invisible to users. From a regular online shopper\u2019s perspective, nothing suspicious takes place. They\u2019re making a purchase on a website that has the right address and no red flags to be seen: it looks and works the way a normal website would. Furthermore, money won\u2019t start disappearing from the victim\u2019s account right away, so it\u2019s difficult, if at all possible, to pinpoint the website where the card was compromised.<\/p>\n<p>Second, web skimmers aren\u2019t too easy to detect \u2014 even by website owners. This presents more of a problem to smaller online stores, which might not have a full-time IT specialist, let alone a cybersecurity expert. But even large online retailers may find that that thoroughly checking their own sites for web skimmers is a challenge that requires fairly exotic skills and tools.<\/p>\n<p>Third, victims are hard pressed to link a theft to a specific store, so it\u2019s highly unlikely anyone would come forward with a complaint. Few owners would undertake the complex and costly task of scanning their website for skimmers (which would require hiring a professional) just to be on the safe side.<\/p>\n<h2>How widespread is the web skimmer threat?<\/h2>\n<p>In a recent study, cybersecurity experts <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-hijack-legitimate-sites-to-host-credit-card-stealer-scripts\/\" target=\"_blank\" rel=\"nofollow noopener\">delved into the web-skimmer situation as it stands today<\/a>. The study analyzed a malicious campaign that\u2019s likely linked to the Magecart cybercrime syndicate, which specializes in web skimmers. The key discoveries were:<\/p>\n<ul>\n<li>Whereas originally web skimmers were implanted only into online stores powered by Magento, the range of compromised platforms became wider. Cybercriminals are now capable of infecting stores that run on Shopify and WordPress with plugins for accepting payments (in particular, with WooCommerce).<\/li>\n<li>To make it difficult to detect a web-skimmer on an infected site, the creators of the implants deliberately make them look like legitimate code of such services as Facebook Pixel, Google Analytics or Google Tag Manager.<\/li>\n<li>One of the latest tricks employed by the hackers who are behind the campaign is to use compromised websites as command-and-control (C&amp;C) servers to manage web skimmers implanted into other sites and exfiltrate stolen payment information. This is how they remain undetected: implanted web skimmers talking to legitimate websites doesn\u2019t look suspicious.<\/li>\n<li>Websites that were found to be infected with web skimmers included fairly large online stores serving hundreds of thousands customers every month.<\/li>\n<li>Statistically speaking, the researchers discovered close to 10,000 websites that contained web skimmers in 2022. A quarter of those were still infected as at the end of the year, suggesting that a web skimmer implant can remain on a compromised website for months if not years.<\/li>\n<\/ul>\n<h2>Protecting yourself from web skimmers<\/h2>\n<p>Our <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">security solution<\/a> will help you secure the online payment process. It employs Safe Browsing technology, which scans all web traffic objects for both known and unknown threats at the moment you click on the link. If it detects a web skimmer in the HTML code or a script file, our product warns you about malware presence and prevents the dangerous page from loading.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.<\/p>\n","protected":false},"author":2726,"featured_media":48510,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[964,1161,178,422],"class_list":{"0":"post-48509","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bank-cards","9":"tag-finance","10":"tag-online-shopping","11":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/48509\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/illicit-code-on-legitimate-sites\/25840\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/21281\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/10819\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/28538\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/illicit-code-on-legitimate-sites\/26139\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/26493\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/illicit-code-on-legitimate-sites\/28976\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/illicit-code-on-legitimate-sites\/27884\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/illicit-code-on-legitimate-sites\/35636\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/illicit-code-on-legitimate-sites\/11612\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/illicit-code-on-legitimate-sites\/21485\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/illicit-code-on-legitimate-sites\/30305\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/illicit-code-on-legitimate-sites\/34217\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/illicit-code-on-legitimate-sites\/26453\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/illicit-code-on-legitimate-sites\/32149\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/illicit-code-on-legitimate-sites\/31833\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/online-shopping\/","name":"online shopping"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=48509"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48509\/revisions"}],"predecessor-version":[{"id":48512,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48509\/revisions\/48512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48510"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=48509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=48509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=48509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}