Last October, we wrote about a new universal man-in-the-browser (uMitB) scam that doesn’t target specific websites but instead collects data submitted to any website without the need for post-processing (parsing through logs to extract valuable data). At the time, we posted a marketing video from the webinject developer that demonstrates two uMitB attacks.

Recently, we came across another marketing video by the same developer that demonstrates a new uMitB attack that targets any website that accepts credit cards. It uses “Verified by Visa” and “MasterCard SecureCode” screens to manipulate victims. The webinject uses the Luhn algorithm to first verify that the card number submitted by the user is legitimate. If it is, the webinject pops up with a fake Verified by Visa or MasterCard SecureCode screen. This exploit is designed to capture the victim’s full card details and their Verified by Visa and MasterCard SecureCode passwords. The webinject can be purchased for $555.

This video illustrates the increasing sophistication of webinject technology and its ability to capture the data necessary to bypass additional security measures such as Verified by Visa and MasterCard SecureCode. Once malware has gained a foothold on the endpoint device, it is virtually impossible for users to tell the difference between a legitimate Web page and a malicious webinject. The only way to protect against these exploits is with technology that can prevent advanced, data-stealing malware from infecting endpoint devices and detecting/blocking it in real time when it does find its way onto the device.

View on-demand webinar: Cybercriminals Never Sleep

More from Malware

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Ex-Conti and FIN7 Actors Collaborate with New Backdoor

15 min read -   April 27, 2023 Update This article is being republished with modifications from the original that was published on April 14, 2023, to change the name of the family of malware from Domino to Minodo. This is being done to avoid any possible confusion with the HCL Domino brand. The family of malware that is described in this article is unrelated to, does not impact, nor uses HCL Domino or any of its components in any way. The malware is…

15 min read

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

7 min read - In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

7 min read