Explorer

Cyber Security Agency CERT-In Warns Of Credit Card Skimming; Issues Advisory For Users

Cyber criminals in these kind of frauds add skimming code on online shopping websites to steal credit card information shared by customers.

New Delhi: India's Cyber security agency - Computer Emergency Response Team (CERT-In) has issued a warning against incidents of credit card skimming frauds on various e-commerce websites across world. ALSO READ | Oxford Scientists Optimistic About Covid-19 Vaccine, Could Be Out By September As quoted in various media reports, the CERT-In stated that "credit card skimming through various e-commerce sites are spreading worldwide. Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP)." According to the experts, the cyber criminals in these kind of frauds add skimming code on online shopping websites to steal credit card information shared by customers. They remotely inject malicious code into one of their legitimate JavaScript libraries which is mainly designed to obtain credit card numbers as well as passwords of the user. As per the release, the cyber criminals are targeting the websites which are hosted on Microsoft’s IIS server running with the ASP.NET web application framework. These include sports organisations, health, shopping portal and e-commerce websites among others which are affected the most by such attacks. ALSO READ | Google Announces Major Redesign For Gmail; Know About New 'Rooms' Feature The government agency has shared a few names of skimmer hosting sites:
  • idpcdn-cloud[.]com
  • joblly[.]com
  • hixrq[.]net
  • cdn-xhr[.]com
  • rackxhr[.]com
  • thxrq[.]com
  • hivnd[.]net
CERT-In also issued an advisory for the users which can protect them from such attacks:
  • The agency advised the users to use only the latest version of ASP.NET web framework, IIS Web server and database server.
  • It further asked he users to apply new or the updated security patches on the OS and applications (when available) through OEM to prevent such attacks.
  • The users should be careful and must restrict or deny all and any kind of access by default. They should allow only the necessary access.
  • The users must also conduct complete and regular security checks of web application, web server and database server. After every major configuration, users may change and plug vulnerabilities if found any.
  • The users may also opt to apply Security Information and Event Management (SIEM) solutions.
 
Read more
Sponsored Links by Taboola

Top Headlines

23 Killed In Massive Fire After Cylinder Blast At North Goa Nightclub
23 Killed In Massive Fire After Cylinder Blast At North Goa Nightclub
DGCA Issues Showcase Notice To IndiGo CEO, Govt Warns Of Strict Action Amid Flight Disruptions: Updates
DGCA Issues Showcase Notice To IndiGo CEO, Govt Warns Of Strict Action Amid Flight Disruptions: Updates
IND vs SA: Jaiswal's Century, Bowlers Seal India's 2-1 Series Win In Vizag
IND vs SA: Jaiswal's Century, Bowlers Seal India's 2-1 Series Win In Vizag
'It's A Shame That...': Tharoor Breaks Silence On Attending Putin Banquet Amid Congress' Criticism
'It's A Shame That...': Tharoor Breaks Silence On Attending Putin Banquet Amid Congress' Criticism

Videos

IndiGo Crisis: Passengers Stranded Nationwide as Anger Grows Over Massive Disruptions
IndiGo Crisis: Delhi Airport Issues Advisory, Urges Passengers to Check Flight Status
IndiGo Crisis Deepens: Massive Flight Cancellations Leave Passengers Stranded
Breaking: Uncle Allegedly Kills Nephew in Sangam Vihar After Minor Garbage Dispute
Breaking: Massive fire at Moradabad scrap warehouse; all rescued safely, blaze under control

Photo Gallery

25°C
New Delhi
Rain: 100mm
Humidity: 97%
Wind: WNW 47km/h
See Today's Weather
powered by
Accu Weather
Embed widget