Credit Card Skimmers Now Uses Fake Facebook and Twitter Icons! New Method aTrickier Malware

Security experts discovered that credit card skimmers are now using a new trickier malware that uses fake social media icons to trick online shoppers and e-commerce stores.

The new method uses a technique called steganography, which refers to hiding information inside another format such as images inside videos, texts inside images, and more. The most common form of steganography attacks is hiding malicious codes or malware inside image files.

Hackers are usually storing them in JPG or PNG formats. Once the malicious code is inside the image, the cybercriminals will download the photo on a host system. According to ZDNet's latest report, it will be executed by another code of the malware gang's components.

Why skimmers use steganography

Most web-based skimmers use steganography because they are typically hidden or stored in JavaScript code and not inside image files. And now, hackers are enhancing this method, with some being spotted using site logos, favicons, and product images to hide malicious malware or codes.

Because of the current adoption, many security researchers are now observing, checking, and analyzing image files as a place that find hidden web skimmer payloads or irregularities.

For more news updates about new hacking schemes, always keep your tabs open here at TechTimes.

This article is owned by TechTimes.

Written by: Giuliano de Leon.

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion
Real Time Analytics