Hackers Hide Credit Card Skimmers in Swap Files: How Your E-commerce Site Could Be Next

Threat actors are using swap files to hide persistent credit card skimmers on compromised websites. This sneaky technique, seen on a Magento e-commerce site, helps malware survive cleanup attempts and exfiltrate payment data. Security experts advise restricting protocols like SSH to trusted IPs and keeping…

Hot Take:

Just when you thought your credit card info was safe, cyber crooks are playing hide and seek with your data like it’s a game of Where’s Waldo. Pro tip: Waldo wins.

Key Points:

  • Threat actors are using swap files to conceal credit card skimmers on compromised websites.
  • The malware was observed on a Magento e-commerce site’s checkout page.
  • Stolen data is exfiltrated to a domain that mimics Amazon’s analytic services.
  • Malware persists on the site by exploiting swap files created during SSH sessions.
  • Compromised WordPress sites are being hit with a malicious plugin masquerading as Wordfence.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here