Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
Researchers have published their analysis of a web skimmer that uses the Telegram API for exfiltration. As with other skimmers, the attack begins when a commerce site is compromised via a vulnerability in their software. Once access is gained, malicious JavaScript code is injected into the website and will be executed on checkout pages. When a user enters data into that checkout page, it’ll be harvested and encrypted. It is then sent in a POST request to a hardcoded Telegram bot and channel via the Telegram API. The code also passes the entered data to the legitimate payment processor in order to complete the transaction so that the malicious activity is more likely to go unnoticed. While the Telegram API has been used by other malware authors to exfiltrate data, this is the first case in which is has been observed as part of a web skimmer.
Data exfiltration