{"id":1897,"date":"2016-12-07T16:39:32","date_gmt":"2016-12-07T13:39:32","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=1897"},"modified":"2019-06-06T13:05:57","modified_gmt":"2019-06-06T10:05:57","slug":"online-skimming","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/online-skimming\/","title":{"rendered":"What is Online Skimming and How to Avoid It"},"content":{"rendered":"<p><a href=\"https:\/\/www.protectimus.com\/blog\/the-most-common-ways-of-credit-card-fraud\/\">Card skimming<\/a>, implemented through card reading slips on ATM machines, is familiar to many. Nowadays this type of credit card fraud is also appearing on the web. Of course, it is improved and adapted according to its new \u2018habitat&#8217;. But the crux of the matter remains the same: the theft of credit card information for its use in criminal undertakings.<\/p>\n<p>On the web, harmful Javascript code effectively replaces the skimmers on the card slots. In order to introduce this code onto the servers of internet shops (it is precisely online stores that turn out to be the most frequent victims of these frauds), hackers exploit vulnerabilities which exist in the websites\u2019 software. After the installation, the spyware reads the data from the credit cards input by clients while making purchases. The information of every credit card payment conducted in the shop is thereby intercepted and sent off to a server under the assailant\u2019s control. After that the thief is able to either sell the card number (on the black market the average price of one \u201clot\u201d ranges around ten dollars)&nbsp;or use the other person\u2019s credit card himself.<\/p>\n<p>All the while protected HTTPS-connection won\u2019t help to protect the data: since the malware is installed on the shop&#8217;s server, information leakage takes place even before the process of encryption. Often a break-in will leave no trace not only for the customer, whose data was abducted&nbsp;but even for the owners of the merchant websites.<\/p>\n<p>Online skimming at first attracted serious attention to itself at the end of 2015, when researchers found over 3000 internet shops which were &#8220;pouring out\u201d client cards\u2019 information. For most of the identified websites, the skimming code worked over the span of a few months, and in certain places even more than half of a year. You don\u2019t even want to imagine how many credit card numbers were compromised during this period.<\/p>\n<p>Since then a year has passed. What are the results? Now the number of merchant sites with online skimming has increased significantly.<\/p>\n<p>One of the factors which impact the increase of infected stores was that hackers learned to skillfully mask the harmful code, making its detection quite difficult. If a year ago just one type of online skimmer with a few modifications in the code was generally used, then today nine types of JS-scripts related to three different families are revealed.<\/p>\n<p>However, the main reason for the spread of online skimming is that the managers of internet stores are not quite concerned to eliminate it. After the detection of the problem, the owners of the resources were at once informed by researchers about vulnerabilities that the data protection systems on their websites had. Unfortunately, the overwhelming majority didn&#8217;t react to that with due attention. Some simply did not respond to the warnings of specialists, some doubted the presence of spyware on their sites, claiming their data protection systems to be all in order.<\/p>\n<p>Meanwhile, there are certain means allowing not only to escape these harmful \u201cadditions\u201d but moreover to prevent reinstallation. This is a special software for scanning websites for the presence of vulnerabilities and changes in code able to exercise daily monitoring and report arising problems.<\/p>\n<p>Insofar as the store owners are clearly not aware of serious problems, it is worthwhile for potential customers to take individual care of the protection of their data and their funds.<\/p>\n<p><strong>In order to do that:<\/strong><\/p>\n<ul>\n<li>Check the domain of the specific store before making a purchase in it in reference to the list of compromised stores (for example, such lists can be found on the site MageReports.com)<\/li>\n<li>It is better to use large, tested internet shops, where there is at least some sort of expectation that online skimming and phishing (yet another modern day online disease) are tracked and intersected by information security specialists.<\/li>\n<li>It is preferable to have a separate card for online purchases, where funds are&nbsp;credited only in the amount necessary for the acquisition of goods.<\/li>\n<li>It is worthwhile to verify each bank operation&nbsp;(best with a one-time password, two-factor authentication).<\/li>\n<\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Card skimming, implemented through card reading slips on ATM machines, is familiar to many. Nowadays this type of credit card fraud is also appearing on the web. Of course, it is improved and adapted according to its new \u2018habitat&#8217;. But the crux of the matter remains the same: the theft of credit card information for [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[202,118,166,230,303],"class_list":["post-1897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-cybersecurity","tag-data-protection","tag-hacking-attacks","tag-information-security","tag-skimming"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=1897"}],"version-history":[{"count":5,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1897\/revisions"}],"predecessor-version":[{"id":4314,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1897\/revisions\/4314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4313"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=1897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=1897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=1897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}