Blog
January 12, 2022
2
MIN READ
PIPKA Advisory

Share this post

TABLE OF CONTENT

Skimming is not a new word to the cybersecurity industry. Earlier, skimming referred to stealing payment data from ATMs by attaching a physical ‘skimmer’ to ATMs. Now, with the evolving payment landscape, skimming has also been evolving into online skimming and targeting e-commerce sites.

Online skimming is an adverse activity of stealing payment information from e-commerce websites by infecting specific sites with sniffers/ Java Script sniffers. Once the malware is injected, it is very hard to detect the traces of it on the website. JS skimmers work as independent teams, develop their malicious JS skimming code, and sell it to the highest bidder in the dark web.

Earlier, in April 2019, Visa Payment Fraud Disruption’s (PFD) e-commerce Threat Disruption (eTD) found 8 e-commerce websites infected with JavaScript skimmers/sniffers. After detecting initial skimming attacks eTD found a shocking number of 17000 e-commerce websites infected with JS skimmers.

The cyberattack after infecting 17000 websites, evolved into an even more sophisticated data-stealing activity. Again, in September 2019, eTD found a new JS skimmer with many novel features.

The advisory details out how ‘pipka’ the new JavaScript skimmer has evolved to perform data breach menace. Then the advisory suggests the steps that must be taken by e-commerce merchants and services providers to prevent pipka or any other JavaScript skimmer from intruding and stealing customers’ payment data.

Get your copy now!

SHARE THIS POST

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript