In the digital age, where online transactions are commonplace, the security of e-commerce platforms is paramount. One of the lesser-known but increasingly prevalent threats to these platforms is the virtual skimmer. Similar to physical skimmers on ATMs or gas pumps, virtual skimmers stealthily steal credit card data, but they do so in the digital realm.
What is a Virtual Skimmer?
A virtual skimmer is a type of malicious software, or malware, specifically designed to intercept and steal payment card details during online transactions. It is usually injected into the web pages of e-commerce sites through compromised third-party services such as advertisements, plugins, or customer support tools. Once in place, the skimmer captures sensitive data as customers enter it into online payment forms.
How Do Virtual Skimmers Operate?
Virtual skimmers operate by inserting malicious code into the JavaScript of a webpage. When a customer types in their payment information, the skimmer secretly records the data and transmits it to a server controlled by cybercriminals. This process is highly covert, making virtual skimmers difficult to detect by both users and website administrators.
The Impact of Virtual Skimmers
The implications of a virtual skimming attack can be devastating. For individuals, it means the unauthorized use of their credit card information, leading to potential financial loss and identity theft. For businesses, it not only results in direct financial damage but also damages the trust customers place in the brand. The reputational impact can be long-lasting and more costly than the immediate financial losses.
The Solution
PCI DSS (Payment Card Industry Data Security Standard) 4.0 introduces significant updates aimed at adapting to the evolving security landscape, technological advancements, and new payment methodologies. Two new requirements, 6.4.3 and 11.6.1, stand out for their forward-looking approach to ensuring secure software development and enhanced authentication mechanisms to protect against virtual skimmers.
Requirement 6.4.3
This requirement focuses on securing public-facing web applications. In the context of PCI DSS 4.0, this requirement mandates that entities implement a standardized methodology for the development and maintenance of secure web applications. It emphasizes the importance of integrating security into the software development lifecycle (SDLC). This involves adopting practices such as threat modelling, secure coding guidelines, and rigorous testing for security vulnerabilities. The aim is to mitigate risks associated with web application vulnerabilities which have been a common attack vector for data breaches. Entities are encouraged to adopt frameworks that promote secure coding and continuous security assessments, ensuring that security is a priority from the initial design phase through to deployment and maintenance.
Requirement 11.6.1
On the other hand, this requirement addresses the strengthening of authentication systems. It requires the implementation of multi-factor authentication (MFA) for all access to the cardholder data environment (CDE), regardless of the access origin. This expands the scope of MFA beyond previous requirements that limited it to remote access from untrusted networks. The expansion of MFA across all access points significantly tightens security, reducing the risk of unauthorized access through compromised credentials. By mandating MFA, PCI DSS 4.0 ensures that the verification process involves multiple evidence sources, which can be something the user knows, possesses, or is.
Together, requirements 6.4.3 and 11.6.1 are designed to bolster the security framework around critical areas vulnerable to attacks such as virtual skimmers. By focusing on secure software development and robust authentication practices, protecting sensitive cardholder information against increasingly sophisticated cyber threats.
Thomas Borrel is an experienced leader in financial services and technology. As Chief Product Officer at Polymath, he led the development of a blockchain-based RWA tokenization platform, and previously drove network management and analytics at Extreme Networks and strategic partnerships at BlueCat. His expertise includes product management, risk and compliance, and security.