Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Cloudseed startups did not cause flooding in Texas

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

YC Back Apolink by 19-year-old Bag $4.3 million to build a 24/7 connection for Leo satellite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Legacy Stripe API misused to validate stolen payment cards in web skimmer campaigns
Identity

Legacy Stripe API misused to validate stolen payment cards in web skimmer campaigns

userBy userApril 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 3, 2025Ravi LakshmananCybersecurity/Threat Intelligence

Web Skimmer Campaign

Threat Hunters is warning of a sophisticated web skimmer campaign that leverages legacy application programming interfaces (APIs) from payment processor stripes to validate payment information stolen before removal.

“This tactic ensures that only valid card data is sent to the attacker, making detection of operations more efficient and potentially difficult,” said Jscrambler researchers Pedroforna, David Alvez and Pedro Marcio in the report.

It is estimated that as many as 49 merchants have been affected by previous campaigns. Fifteen of the compromised sites have taken steps to remove malicious script injections. This activity has been rated as ongoing since at least August 20, 2024.

Cybersecurity

The campaign details were first flagged by security company source defense towards the end of February 2025, with web skimmers detailing the use of API.Stripe[.]com/v1/sources “API. This allows the application to accept a variety of payment methods. The endpoint has since been deprecated in favor of the new payment methods API.

Attack chain employs a malicious domain as the initial distribution point for JavaScript skimmers designed to intercept and hide legitimate payment forms on the order checkout page, provide replicas of legitimate striped payment screens, verify using the source API, and send them to remote servers in base 64 encoding format.

Jscrambler said that the threat actors behind the surgery are likely to be embedding early-stage scripts by leveraging vulnerabilities and misconceptions in WooCommerce, WordPress and Prestashop. This loader script helps you decrypt and launch the Base64 encoded next stage. This includes a URL pointing to a skimmer.

“The skimming script overlays a legitimate striped iframe with malicious ones designed to hide and mimic the appearance of it,” the researchers said. “Also, clone the ‘Order’ button and hide the real button. ”

Cybersecurity

Once the details are drawn, the user will receive an error message and ask you to reload the page. There is some evidence that suggests that the final skimmer payload is generated using some tool, as the script appears to be tailored to each target site.

The security company also discovered a skimmer script impersonating Square’s payment form, suggesting that it is likely that threat actors are targeting several payment service providers. And that’s not all. Skimming codes have also been observed to use cryptocurrencies such as Bitcoin, Ether (Ethereum), Tether and Litecoin to add other payment options.

“This sophisticated web skimming campaign highlights the evolving tactics used by attackers to keep them undetected,” the researchers said. “And as a bonus, they effectively exclude invalid credit card data and ensure that only valid credentials have been stolen.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEuropol dismantles Kidflix with 72,000 CSAM videos seized in major operations
Next Article Why is Zimbabwean President Mnangagwa facing pressure to resign? |Political News
user
  • Website

Related Posts

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025

perfektblue bluetooth vulnerability exposes millions of vehicles to remote code execution

July 11, 2025

Protecting data in the AI ​​era

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Cloudseed startups did not cause flooding in Texas

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

YC Back Apolink by 19-year-old Bag $4.3 million to build a 24/7 connection for Leo satellite

Helios wants to be an AI operating system for public policy experts

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.