Article 58TNZ Boom! Hacked page on mobile phone website is stealing customers’ card data

Boom! Hacked page on mobile phone website is stealing customers’ card data

by
Dan Goodin
from Ars Technica - All content on (#58TNZ)
card-skimming-800x591.jpg

Enlarge / Computer hacker character stealing money online. Vector flat cartoon illustration (credit: GettyImages)

If you're in the market for a new mobile phone plan, it's best to avoid turning to Boom! Mobile. That is, unless you don't mind your sensitive payment card data being sent to criminals in an attack that remained ongoing in the last few hours.

According to researchers from security firm Malwarebytes, Boom! Mobile's boom.us website is infected with a malicious script that skims payment card data and sends it to a server under the control of a criminal group researchers have dubbed Fullz House. The malicious script is called by a single line that comprises mostly nonsense characters when viewed with the human eye.

encoded-string-640x563.png

(credit: Malwarebytes)

When decoded from Base64 format, the line translates to: paypal-debit[.]com/cdn/ga.js. The JavaScript code ga.js masquerades as a Google Analytics script at one of the many fraudulent domains operated by Fullz House members.

Read 5 remaining paragraphs | Comments

index?i=pkO1ub6t4hw:iD_cFwrBC2g:V_sGLiPB index?i=pkO1ub6t4hw:iD_cFwrBC2g:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments