In a blog post(opens in new tab), the company outlined how it detected a web skimming attack on a discounted web marketing and analytics service occurred through the acquisition of its domain name (Cockpit). The domain name has not been in use since 2014.
The Group X skimmers were able to compromise over 40 ecommerce websites(opens in new tab), and the data collected from the sites was encoded, encrypted and sent to an exfiltration server based in Russia, according to Jscrambler.
Active web skimming attacks
The vendor mentions that once the cyber-criminals successfully exfiltrate the data of the webpage’s original elements, it injects its own fake elements by impersonating a credit card submission form.
Through the use of this method of hacking, any data inserted by the user will continue to be gathered and leaked every time there is a click on the page.
Jscrambler also found two other web skimming groups – Group Y and Group Z, with Group Y reportedly using a similar skimmer to Group X, while Group Z used a modified server structure for its attacks.
Web skimming, also known as Magecart attacks, occurs when hacker groups use online skimming techniques for the purpose of stealing personal data from websites. The hackers mostly target credit card information on sites that accept online payment or personal customer information.
The blog post mentions that there’s a chance that some websites were using a Content Management System (CMS(opens in new tab) or a website generator provider that was injecting the third-party script into their pages.
“In that case, they might be unable to remove the library from their websites due to restricted permissions or lack of knowledge,” Jscrambler wrote.
In November, 2022, the UK’s National Cyber Security Centre (NCSC) alerted over 4,000 small business websites about the compromised payment portals(opens in new tab) on their ecommerce platforms, ahead of Black Friday – the busiest time for online retailers.