Contact

Stripe API Skimming Campaign: Additional Victims & Insights

NetmanageIT OpenCTI - opencti.netmanageit.com

Stripe API Skimming Campaign: Additional Victims & Insights



SUMMARY :

A sophisticated web skimming campaign has been discovered, utilizing a legacy Stripe API to validate stolen payment details before exfiltration. The attack involves multiple stages, including malicious loader injection, decoding, and skimming. Jscrambler's research team identified 49 affected merchants and uncovered additional domains potentially involved in the campaign. The skimmers are tailored for each targeted site and exploit vulnerabilities in e-commerce platforms. The attackers employ minimal obfuscation and transmit stolen data without encryption. The campaign has been active since August 2024, primarily targeting WooCommerce and WordPress sites. To protect against such attacks, merchants are advised to implement real-time webpage monitoring and adopt hardened iframe implementations.

OPENCTI LABELS :

wordpress,e-commerce,javascript injection,web skimming,payment fraud,stripe api,woocommerce,client-side security


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


Stripe API Skimming Campaign: Additional Victims & Insights