What is skimming?
Skimming is a form of credit card theft with advanced hacking technologies. Crooks collect card information through a small device called a skimmer. It allows fraudsters to capture all cardholder information and use that information to conduct fraudulent transactions.
What is a Web attack by Skimming?
The web-skimming scam has occurred on e-commerce sites on 3 continents. There are about 20 e-commerce websites in North America, South America, and Europe that have recently encountered a phishing attack on the website with a Google Analytics impersonation scam.
Although these e-commerce websites have different business items in many product areas such as digital devices, cosmetics, food, and accessories. But the common point of victim websites is that it does not prevent fake typo errors, intentionally imitating another legitimate website, typically a fake website such as: “google-anatytics.com” instead of is “analytics.google.com” is the legal destination.
Over the past decade, Google Analytics has developed a set of essential tools for businesses to be able to analyze user traffic to their site in detail, so it receives great trust from users. and used by more than 29 million websites. This is the reason why many hackers have tried to disguise the Google Analytics service to scam web users.
In order to control the flow of data that is transferred to hidden third-party resources, hackers often register domain names that are similar to the names of popular web support services. Typically, hackers often own a multitude of variations with URLs closest to the domain that is legally operating, many studies also show that these URLs sometimes use Google Analytics to authenticate, as these are The site is trusted by countless users and is less cautious.
To collect user access data using Google Analytics, websites must configure tracking parameters in their accounts on analytics.google.com, obtaining the tracking ID (including a string such as UA- XXXX-Y) and insert it into the site. Track users accessing the website through this code, then send data about the status of user access to management accounts using Analytics.
The recently released list of cyberattacks identifies a number of cases of web services being abused by attackers injecting malicious code into the targets they were targeting. Typically, Google Analytics will collect data about web access status from users and analyze it. From this behavior, the attacker can use it to record log data in their Google Analytics account.
Cloud WAF comprehensive website protection
To combat these dangerous Web attacks, many large websites have implemented the website security plans with the most advanced technology in the world with Cloud WAF (Web App Firewall) firewall.
Cloud WAF prevents any abuse of vulnerabilities to damage your Website. Websites today have many dangerous vulnerabilities such as malicious code insertion, hijacking, data leakage or data theft, etc. Cloud WAF will help you cover all the weak vulnerabilities. on the Website and prevent malicious code injection attacks. Website vulnerabilities can be caused by mistakes from the Web programming stage or from web applications (especially account login applications).
Webmasters often do not have an overview of issues such as website security, their tasks are usually simple tasks such as updating the content on the web so that it is attractive, beautiful, attractive, fast loading. and pay less attention to preventing malicious code injection attacks on the web. This is also the biggest loophole for hackers to take advantage of attacks on the web easier. Attacks that detect web vulnerabilities with automated bots will give hackers a list of potential vulnerabilities.
Cloud WAF uses artificial intelligence technology to create a comprehensive cloud-based website protection solution to help prevent attacks of web vulnerabilities, DDoS, Botnet, Crawler, and The latest potential threats.
Hotline: (028) 7306 8789