• Book Dewayne Hart
  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
  • Speaker Bio
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
Facebook-f Linkedin-in Youtube X-twitter Globe
Order books

Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign

Posted on April 4, 2025 by admin

[ad_1]

Apr 03, 2025Ravie LakshmananCybersecurity / Threat Intelligence

Web Skimmer Campaign

Threat hunters are warning of a sophisticated web skimmer campaign that leverages a legacy application programming interface (API) from payment processor Stripe to validate stolen payment information prior to exfiltration.

“This tactic ensures that only valid card data is sent to the attackers, making the operation more efficient and potentially harder to detect,” Jscrambler researchers Pedro Fortuna, David Alves, and Pedro Marrucho said in a report.

As many as 49 merchants are estimated to have been affected by the campaign to date. Fifteen of the compromised sites have taken action to remove the malicious script injections. The activity is assessed to be ongoing since at least August 20, 2024.

Cybersecurity

Details of the campaign were first flagged by security firm Source Defense towards the end of February 2025, detailing the web skimmer’s use of the “api.stripe[.]com/v1/sources” API, which allows applications to accept various payment methods. The endpoint has been deprecated in favor of the new PaymentMethods API as of May 15, 2024.

The attack chains employ malicious domains as the initial distribution point for the JavaScript skimmer that’s designed to intercept and hide the legitimate payment form on order checkout pages, serve a replica of the legitimate Stripe payment screen, validate it using the sources API, and then transmit it to a remote server in Base64-encoded format.

Jscrambler said the threat actors behind the operation are likely leveraging vulnerabilities and misconfigurations in WooCommerce, WordPress, and PrestaShop to implant the initial stage script. This loader script serves to decipher and launch a Base64-encoded next-stage, which, in turn, contains the URL pointing to the skimmer.

“The skimming script hides the legitimate Stripe iframe and overlays it with a malicious one designed to mimic its appearance,” the researchers said. “It also clones the ‘Place Order’ button, hiding the real one.”

Cybersecurity

Once the details are exfiltrated, users are displayed an error message, asking them to reload the pages. There is some evidence to suggest that the final skimmer payload is generated using some sort of tool owing to the fact that the script appears to be tailored to each targeted site.

The security company further noted that it uncovered skimmer scripts impersonating a Square payment form, suggesting that the threat actors are likely targeting several payment service providers. And that’s not all. The skimming code has also been observed adding other payment options using cryptocurrencies like Bitcoin, Ether (Ethereum), Tether, and Litecoin.

“This sophisticated web skimming campaign highlights the evolving tactics attackers use to remain undetected,” the researchers said. “And as a bonus, they effectively filter out invalid credit card data, ensuring that only valid credentials are stolen.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Recent Posts

  • No Blind Spots: A Veteran’s Blueprint to Protect Critical Infrastructure
  • Cybersecurity as a Growth Lever: A Board-Ready Playbook for CIOs and CTOs
  • From Reaction to Readiness: Building a Cybersecurity Mindset for Proactive Defense
  • Cybersecurity Leadership in 2026: Executive Decisions that Drive Resilience and Growth
  • Implementing a Hacker’s Mindset: Build a Security Culture That Hunts, Learns, and Wins

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023

Categories

  • Cyber News
  • Uncategorized

Book Dewayne Hart for your next event

  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
Facebook-f Linkedin-in Youtube X-twitter Globe
© 2025 Dewayne Hart | Cybersecurity Leadership & Innovation