Article Details

Scrape Timestamp (UTC): 2025-04-03 04:54:24.009

Source: https://thehackernews.com/2025/04/legacy-stripe-api-exploited-to-validate.html

Original Article Text

Click to Toggle View

Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign. Threat hunters are warning of a sophisticated web skimmer campaign that leverages a legacy application programming interface (API) from payment processor Stripe to validate stolen payment information prior to exfiltration. "This tactic ensures that only valid card data is sent to the attackers, making the operation more efficient and potentially harder to detect," Jscrambler researchers Pedro Fortuna, David Alves, and Pedro Marrucho said in a report. As many as 49 merchants are estimated to have been affected by the campaign to date. Fifteen of the compromised sites have taken action to remove the malicious script injections. The activity is assessed to be ongoing since at least August 20, 2024. Details of the campaign were first flagged by security firm Source Defense towards the end of February 2025, detailing the web skimmer's use of the "api.stripe[.]com/v1/sources" API, which allows applications to accept various payment methods. The endpoint has since been deprecated in favor of the new PaymentMethods API. The attack chains employ malicious domains as the initial distribution point for the JavaScript skimmer that's designed to intercept and hide the legitimate payment form on order checkout pages, serve a replica of the legitimate Stripe payment screen, validate it using the sources API, and then transmit it to a remote server in Base64-encoded format. Jscrambler said the threat actors behind the operation are likely leveraging vulnerabilities and misconfigurations in WooCommerce, WordPress, and PrestaShop to implant the initial stage script. This loader script serves to decipher and launch a Base64-encoded next-stage, which, in turn, contains the URL pointing to the skimmer. "The skimming script hides the legitimate Stripe iframe and overlays it with a malicious one designed to mimic its appearance," the researchers said. "It also clones the 'Place Order' button, hiding the real one." Once the details are exfiltrated, users are displayed an error message, asking them to reload the pages. There is some evidence to suggest that the final skimmer payload is generated using some sort of tool owing to the fact that the script appears to be tailored to each targeted site. The security company further noted that it uncovered skimmer scripts impersonating a Square payment form, suggesting that the threat actors are likely targeting several payment service providers. And that's not all. The skimming code has also been observed adding other payment options using cryptocurrencies like Bitcoin, Ether (Ethereum), Tether, and Litecoin. "This sophisticated web skimming campaign highlights the evolving tactics attackers use to remain undetected," the researchers said. "And as a bonus, they effectively filter out invalid credit card data, ensuring that only valid credentials are stolen."

Daily Brief Summary

CYBERCRIME // Legacy Stripe API Used to Validate Stolen Cards in Skimming Campaign

A web skimmer campaign exploits legacy Stripe API to verify stolen payment card details, increasing operational efficiency.

Researchers from Jscrambler identified the campaign impacting an estimated 49 merchants, with ongoing activity traced back to at least August 2024.

The skimmers intercept payment data on websites by mimicking legitimate payment interfaces, disguising the fraudulent operations.

Fifteen affected merchants have addressed and removed the malicious scripts from their sites.

The campaign primarily targets vulnerabilities in platforms like WooCommerce, WordPress, and PrestaShop to inject the skimming code.

Malicious domains serve as the initial distribution points for the JavaScript skimmer, which then overlays legitimate Stripe payment forms.

The attackers also experimented with skimmer scripts that impersonate other payment providers and offer transactions in various cryptocurrencies.

This sophisticated strategy not only helps evade detection but ensures high-value data theft by predetermining the validity of card details.