e Credit Card Skimmers Are Thriving During the Pandemic
With hundreds of millions of people reaching out to the rest of the world through the new coronavirus, many short-term stores have been closed, and online stores have been able to recover. However, as consumers increasingly resort to online spending, criminals have forced websites to "view" credit card numbers on field day.
Digital scammers - the malicious code that hackers send to legitimate pay-per-click websites - have been exposed to direct shoppers before the Covid-19 crisis. But as with any mismanagement during sales, such as Black Friday, cybercrime creates a huge risk for new attacks, especially when companies are struggling and switching to remote operations. Jonathan Klinsma, head of security risk research at RiskIQ, said in March that the company had seen an increase of more than ten percent in February.
"E-commerce crimes are becoming more and more perpetual when they are manipulating or manipulating people to gain more internet traffic," Kleinsma said. "Now that we are all part and parcel of the home, this means that online shopping will grow and this will be a good time for criminals."
"You can't eliminate the chance, but you can reduce it."
Jeremy Segura, MALWARE
There are two photographers at the height of the time involved in this wave of work. Researchers at the security company Malwarebytes released last week an investigation into the criminal code they found on the website of food storage company Tupperware. The hackers used the vulnerabilities of the database to implement their computer systems, so it sent credit card numbers and other information as consumers filled out payment forms to sell. A week ago, RiskIQ launched a similar attack on the pharmaceutical company NutriBullet, which the firm said was the digital team of Magecart's chemist.
RiskIQ first discovered the NutriBullet attack in late February but could not contact the trailer developer. Meanwhile, researchers are coordinating their work with other scientists on the Internet to eliminate skimming damage on March 1. Because NutriBullet does not eliminate space errors, activists used to defend it, but Magecart introduced a new startup platform for the desktop on March 5th. In the next few days, RiskIQ reports that NutriBullet has closed its website vulnerabilities and prevented theft, but Nutribullet's accountability has made it all worthwhile.
Tupperware has been tested for Malwarebytes genealogy. While some of these may be explained by issues that illustrate the common security for companies, Malwarebytes head of terror Jerome Segura points out that a potentially deadly virus can cause problems and problems. companies' response to security firms.
"One thing that could happen is that what is happening in what's happening right now is that many people are struggling to figure out a problem on the company's websites," Segura says. "Someone I spoke to at Tupperware bothered me and said, 'I don't know what you're going through right now. Everyone's working at home, this is a difficult time. "And I said," I'm sure, but you have to fix it. "
Malwarebytes first reported on Tupperware on March 20. The company reported that a malicious hacker had been removed from its site on March 25, the day Malwarebytes released its findings.
"Tupperware has raised a problem that has hit the industry without access to e-commerce codes in the US and Canada," the company said. "As a result, we launched our own investigation, worked out ways to remove the unauthorized code, and the data center's intelligence agency joined forces to assist in the investigation. . They have contacted the law enforcement authorities. Our investigation is ongoing and it is still too early to report. "
Unlike RiskIQ, Malwarebytes does not see a significant increase in skaging attacks from the new coronavirus, but Segura says this is only partly because the common ground for these attacks is so strong . And he acknowledges that it is now important for users to be mindful of risk and caution.
Post a Comment