- What’s Pipka?
- What does it extract?
- How does Pipka Skimmer Extract?
- Impact of Pipka Skimmer
- How to mitigate the attack?
Magecart attacks have been in news recently in the eCommerce world globally this year. A new advanced threat is in the news, which is strikingly similar to Magecart attacks and arguably more sophisticated- Pipka.
What does it extract?
Much like other website skimmers, the code targets payment data entered into payment forms on e-commerce websites. The malicious code extracts payment data, including- name, account number, expiration dates, and CVV.
How does Pipka skimmer Extract?
Pipka Skimmer has advanced tactics to avoid detection. The most interesting and unique aspect of Pipka is its ability to remove itself from the HTML code after successful execution, researches said. Henceforth, you can never see if it if you looked for it in an unusual way.
Pipka finds out a vulnerable website and is injected into the checkout form code, ready to steal any data entered into the form. The data is base64 encoded and encrypted using ROT13 cipher and checks for duplicate data. Once the checks are carried out, the data is exfiltrated to an external server. When the skimmer executes, it calls the ‘Start’ function, which looks for data every second and then calls upon the ‘Clear’ function, which locates the skimmer script tag and removes it, ending up in cleaning up itself.
For example, all A’s are replaced with N’s; all B’s are replaced with O’s and so on. For clarification, refer below:
Further, Pipka checks if the data string was previously sent to avoid data duplication. If the data string is unique, then data is fetched and sent to a command and control (C2) server. Pipka’s self-cleaning begins as soon as the initial script loads, becoming difficult to detect its presence on a compromised web page.
The malware is designed in such a way that a sample is customized to target two-step checkout pages that collect billing data on one page and payment account data on another.
Impact of Pipka skimmer:
Negative Brand reputation is the most noticeable impact of the attacks. In addition to the overall brand retribution, companies have to handle unhappy customers successfully and deal with their pain and inconvenience of card information being stolen. Pipka Skimmer has compromised 16 eCommerce websites to date.
The protection for consumers ultimately falls far from the eCommerce company. The companies that are vulnerable to malware attacks are victimized and fined heavily for their poor security practices.
How to mitigate the attack?
- Examine your web traffic to know if you are targeted.
- Look for website vulnerabilities, whether you can access to make website changes, and have the ability to add 3rd party vendors.
- By implementing checks in eCommerce environments for potential communications with the C2 servers.
- Beware of the code integrated via service providers.
- Close vet utilized Content Delivery Networks (CDN) regularly.
- Examine access control to Admin users.
- Regularly scan and test eCommerce sites for malware vulnerabilities.
- Never drop down the firewall of antispyware malware.
- Make sure other integrations are all upgraded and patched.
- Contact the trusted authority (Visa) immediately if you suspect your website is infected.
- Limit access to the administrative portal and the accounts needing them.
- Regularly ensure shopping carts or other services are upgraded or patched.
The result of Pipka is, however, similar to any other skimmer, except for some methods like – exfiltrating payment card data from e-commerce merchant websites.
It is very obvious that Pipka will continue to be used by threat actors to compromise the e-commerce merchant websites and harvest payment account data. The right thing to do is to limit access to the administrative portals as well as implement a security shield on the website. For the safety of users, they need to ensure that the shopping carts are upgraded or patches regularly; if not, contact the e-commerce merchant immediately for details.
To know more about day-to-day cyber-attacks/ threats, and how to mitigate them, go to the Security Awareness Blog for more information. That was all about Pipka Skimmer, if any further details encountered will be put up sooner. Bringing me back to the recent ransomware attack – Ransomware Attack: Hackers Demand $5 Million From Mexico’s State-Oil Firm. The hack detected on Sunday (November 10) by Premex, and the company was forced to shut down its computers across Mexico. Premex encountered with a darknet affiliated with ‘DoppelPaymer’ (a type of ransomware). To know more, visit here!!
Stay Updated. Stay Protected!