Credit Card Skimming Malware Infected Republican Donor Website Spanning Six Months


Indicating that cyber-criminals actually do not hold any political allegiances, latest news tells that over the past 6 months an online site through which funds are collected to aid Senate Republicans contracted malware. The malware provided the crooks access to Republican donors' names and addresses along with payment card information.

As per Willem de Groot, security developer and researcher, the National Republican Senatorial Committee's (NRSC) storefront related to some 5,900 e-commerce services was lately discovered compromised with data-stealing software.

The Holland-based security researcher explained that anybody buying items from the NRSC and/or giving charity to it through its website possibly ended up divulging his credit card details that probably got sold over the shady regions of the Web. Further according to De Groot, it was discovered that the filched information got transmitted onto multiple servers situated inside Belize that an ISP of Russian language ran. Ibtimes.co.uk posted this, October 18, 2016.

The researcher stated that he split the malicious software implanted on NRSC's website as well as other servers only to find that weak passwords and security flaws were exploited for hacking into the different e-commerce forums.

He also discovered that the malware was destined to particular URLs that appeared as lawful websites for e-commerce operations. These websites included magento-connected[dot]com, visa-cdn[dot]com and jquery-cloud[dot]net.

Brian Krebs, Security Journalist reporting on the discoveries of De Groot stated that keyloggers employed on the Web performed form grabbing too, splitting form data that Internet site visitors submitted such as names, phone numbers, addresses, payment card numbers along with their verification codes, as consumers swiped in the details while checking out online.

The malware is hard to get noticed because it's quietly planted inside the web-page's code, while a not-so-savvy Web-surfer thinks it to be routine Web-code. Furthermore, since the page has wiretap code actively running there instead of tapping web-traffic, the code flawlessly runs on protected HTTPS pages, making visitors no better perceivers of the malware.

The motives of the political hacks appear different, says FBI such as the DNC security breaches appear to be aimed at manipulating the election's outcome, while the NRSC breach appears financially motivated.

» SPAMfighter News - 10/21/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next