Security experts discovered that credit card skimmers are now using a new trickier malware that uses fake social media icons to trick online shoppers and e-commerce stores.
Also Read : Gionee Charged Guilty of Intentionally Infecting 20 Million Phones with Trojan Horse Malware for Profit
The new method uses a technique called steganography, which refers to hiding information inside another format such as images inside videos, texts inside images, and more. The most common form of steganography attacks is hiding malicious codes or malware inside image files.
Hackers are usually storing them in JPG or PNG formats. Once the malicious code is inside the image, the cybercriminals will download the photo on a host system. According to ZDNet's latest report, it will be executed by another code of the malware gang's components.
Why skimmers use steganography
Most web-based skimmers use steganography because they are typically hidden or stored in JavaScript code and not inside image files. And now, hackers are enhancing this method, with some being spotted using site logos, favicons, and product images to hide malicious malware or codes.
Because of the current adoption, many security researchers are now observing, checking, and analyzing image files as a place that find hidden web skimmer payloads or irregularities.
For more news updates about new hacking schemes, always keep your tabs open here at TechTimes.
Related Article : US Cybersecurity Agency Flags Vulnerabilities on Millions of Smart Devices Using Open-Source Software
This article is owned by TechTimes.
Written by: Giuliano de Leon.