Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Security researchers recently detected online skimming campaign that employed numerous obfuscation techniques to escape detection. The threat actors disguised the skimming script by encoding it in PHP, which was then placed in an image file; as a result, the code is executed when a website’s index page is loaded.
They also discovered infected web apps with malicious JavaScript masquerading as Google Analytics and Meta Pixel (previously Facebook Pixel) scripts. Anti-debugging measures were also implemented in several skimming scripts.
Web skimming refer to the illegal practice of gathering financial information from website users during the checkout process. Crooks insert the skimming script into the e-store page by exploiting vulnerabilities in e-commerce platforms and CMSs. In rare circumstances, attackers can inject malicious scripts by exploiting vulnerabilities in installed third-party plugins and themes.
During their research, they discovered two instances of malicious image files being uploaded to a Magento-hosted server. Both images contained a PHP script with a Base64-encoded JavaScript, and while the JavaScript code was similar, the PHP implementation changed slightly.
Attackers was also seen masquerading as Google Analytics and Meta Pixel (formerly Facebook Pixel) scripts to avoid raising suspicion.
Inside a faked Google Tag Manager code, the attackers include a Base64-encoded text. Trafficapps[.]business/data[.]php?p=form was encoded from this string.
Experts discovered that the perpetrators behind the Meta Pixel spoofing employed recently registered domains (NRDs) using HTTPS.
They also include,
Organizations should verify that their e-commerce platforms, CMSs, and installed plugins are up to date with the latest security updates, and that they only download and utilise third-party plugins and services from reputable sources, given the increasingly deceptive strategies used in skimming schemes.