According to cybersecurity specialists, a hacker group has created a fake icon website with the goal of hiding malicious code and stealing payment card data on compromised websites, in what experts consider one of the most sophisticated hacking campaigns.
The cybersecurity community knows this attack variant as a skimming campaign or Magecart attack. Hackers compromise websites and then hide the malicious code on their pages, code that records and steals payment card details as they are entered into the payment forms.
The popularity of skimming attacks has increased considerably over the past four years, and as security companies improve their methods of anticipating hackers to detect them, they are also becoming more skilful and sophisticated.
In a recently released report, cybersecurity firm Malwarebytes mentions that a group of threat actors was detected taking their operations to a whole new level of sophistication. Researchers from the security company say that this hacking group was detected during an analysis of recent attacks related to favicon, the logo image displayed by tabs in a web browser.
The new favicon was a legitimate image file hosted on MyIcons.net, with no hidden malicious code inside. However, although the change seemed innocent, Malwarebytes said that the web browsing code was still loaded on some compromised sites, so it became obvious that something was wrong.
The hackers behind this operation made great efforts to hide their malicious code; however, such an aggressive skimming campaign is unlikely to go unnoticed, cybersecurity experts mention. However, researchers fear that other similar malicious campaigns will be detected in the future.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.