We are a Data Security Platform (DSP) that allows organizations to discover, classify, and protect their most sensitive data and documents.
© 2025 DataStealth Inc. All Rights Reserved.
A virtual skimmer is a type of malicious software, or malware, specifically designed to intercept and steal payment card details during online transactions. It is usually injected into the web pages of e-commerce sites through compromised third-party services such as advertisements, plugins, or customer support tools. Once in place, the skimmer captures sensitive data as customers enter it into online payment forms.
Virtual skimmers operate by inserting malicious code into the JavaScript of a webpage. When a customer types in their payment information, the skimmer secretly records the data and transmits it to a server controlled by cybercriminals. This process is highly covert, making virtual skimmers difficult to detect by both users and website administrators.
The implications of a virtual skimming attack can be devastating. For individuals, it means the unauthorized use of their credit card information, leading to potential financial loss and identity theft. For businesses, it not only results in direct financial damage but also damages the trust customers place in the brand. The reputational impact can be long-lasting and more costly than the immediate financial losses.
PCI DSS (Payment Card Industry Data Security Standard) 4.0 introduces significant updates aimed at adapting to the evolving security landscape, technological advancements, and new payment methodologies. Two new requirements, 6.4.3 and 11.6.1, stand out for their forward-looking approach to ensuring secure software development and enhanced authentication mechanisms to protect against virtual skimmers.
This requirement focuses on securing public-facing web applications. In the context of PCI DSS 4.0, this requirement mandates that entities implement a standardized methodology for the development and maintenance of secure web applications. It emphasizes the importance of integrating security into the software development lifecycle (SDLC). This involves adopting practices such as threat modelling, secure coding guidelines, and rigorous testing for security vulnerabilities. The aim is to mitigate risks associated with web application vulnerabilities which have been a common attack vector for data breaches. Entities are encouraged to adopt frameworks that promote secure coding and continuous security assessments, ensuring that security is a priority from the initial design phase through to deployment and maintenance.
On the other hand, this requirement addresses the strengthening of authentication systems. It requires the implementation of multi-factor authentication (MFA) for all access to the cardholder data environment (CDE), regardless of the access origin. This expands the scope of MFA beyond previous requirements that limited it to remote access from untrusted networks. The expansion of MFA across all access points significantly tightens security, reducing the risk of unauthorized access through compromised credentials. By mandating MFA, PCI DSS 4.0 ensures that the verification process involves multiple evidence sources, which can be something the user knows, possesses, or is.