While reports of web skimmers have become fairly common over the last year or so, every so often there is a twist. A report from Malwarebytes Labs looks at the activities of a group who not only carry out skimming attacks, but also use phishing pages crafted to resemble those of payment service platforms to obtain credentials. The skimmer code is injected into web pages using the file “ga.js” which is crafted to appear as a Google Analytics library. The sample analyzed in the report is almost identical to the legitimate page with the only giveaway being the domain name involved. Once a victim enters their data into the fraudulent page, they will be redirected to the legitimate page and even have the correct payment amount inserted into the page.