Stripe Skimmer Shenanigans: How Cyber Thieves Are Upping Their Game with Old APIs
Threat hunters have uncovered a dastardly web skimmer campaign using Stripe’s legacy API to validate stolen payment info. It’s the criminal equivalent of checking if a stolen car has enough gas before taking off! 49 merchants are impacted, and the attackers even accept Bitcoin, Ether, and other cryptocurrencies. Now that’s modern thievery!

Hot Take:
It seems even hackers have a knack for quality control these days! Who knew cybercriminals had such high standards for their data? They’re not just any skimmers; they’re connoisseurs of card data.
Key Points:
- Threat hunters uncover a sophisticated web skimmer campaign using a legacy API from Stripe.
- 49 merchants have been affected, with only 15 acting to remove the malicious scripts.
- The campaign uses the deprecated “api.stripe[.]com/v1/sources” endpoint to validate stolen card data.
- Threat actors exploit vulnerabilities in platforms like WooCommerce, WordPress, and PrestaShop.
- Skimmers also mimic payment forms from other providers and even support cryptocurrency options.
Already a member? Log in here