Last October, we wrote about a new universal man-in-the-browser (uMitB) scam that doesn’t target specific websites but instead collects data submitted to any website without the need for post-processing (parsing through logs to extract valuable data). At the time, we posted a marketing video from the webinject developer that demonstrates two uMitB attacks.

Recently, we came across another marketing video by the same developer that demonstrates a new uMitB attack that targets any website that accepts credit cards. It uses “Verified by Visa” and “MasterCard SecureCode” screens to manipulate victims. The webinject uses the Luhn algorithm to first verify that the card number submitted by the user is legitimate. If it is, the webinject pops up with a fake Verified by Visa or MasterCard SecureCode screen. This exploit is designed to capture the victim’s full card details and their Verified by Visa and MasterCard SecureCode passwords. The webinject can be purchased for $555.

This video illustrates the increasing sophistication of webinject technology and its ability to capture the data necessary to bypass additional security measures such as Verified by Visa and MasterCard SecureCode. Once malware has gained a foothold on the endpoint device, it is virtually impossible for users to tell the difference between a legitimate Web page and a malicious webinject. The only way to protect against these exploits is with technology that can prevent advanced, data-stealing malware from infecting endpoint devices and detecting/blocking it in real time when it does find its way onto the device.

View on-demand webinar: Cybercriminals Never Sleep

More from Malware

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

A View Into Web(View) Attacks in Android

James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses overlay techniques to steal victims’ credentials. In 2022, IBM Security Trusteer researchers discovered a new trend in financial mobile malware that targets…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…

Raspberry Robin and Dridex: Two Birds of a Feather

IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure and functionality. Thus, IBM Security research draws another link between the Raspberry Robin infections and the Russia-based cybercriminal group 'Evil Corp,' which is the same…