Web Skimming Attack on Blue Bear Affects School Admin Software Users
A web skimming attack was used to target a school administration software that handles school accounting, student fees, and online stores for K-12 and other educational institutions.
Active Networks, the parent company of the concerned Blue Bear Software, released a notice on the data breach. The attack potentially affects users that purchased items between October 1 and November 13, 2019 from a school webstore that runs on the e-commerce platform.
Names, credit card or debit card numbers, expiration dates and security codes, and Blue Bear account usernames and passwords may have been collected. Active Network clarified that the incident did not involve unauthorized access to Social Security numbers, driver license numbers, or similar government ID card numbers. The company is still looking into the incident and has taken steps to enhance security measures. Customers are advised to review account statements and credit reports, and are encouraged to use the provided identity monitoring services that include alerts for card data changes and fraud consultations.
Credit card skimming attacks on compromised websites take advantage of weaknesses in e-commerce platforms, where attackers inject skimming scripts into checkout pages to collect data. Online retailers are prime targets for web skimming attacks since credit card data can be stolen during checkout through third-party providers.
Skimming attacks have become more commonplace, spurring the Federal Bureau of Investigation (FBI) to issue a security warning in October 2019, alerting small- and medium-sized businesses (SMBs) and government agencies about the threat and providing security recommendations to protect against potential compromise.
Threat actors that employ this skimming attack continuously come up with different ways to stay undetected on compromised sites. To prevent such attacks, site owners should regularly check and strengthen security with patches and server segregation. They should also employ authentication mechanisms, especially for sites that handle sensitive data. This would also mean reviewing their overall cybersecurity posture, especially for those areas where they employ third-party vendors.
Security teams should also delete or disable outdated components and regularly monitor websites and applications for any suspicious activity. Undetected threats could lead to data exfiltration, execution of unauthorized scripts, or unwanted access and modification.
The following Trend Micro solutions, powered by XGen™ security, protect users and businesses by blocking the scripts and preventing access to malicious domains:
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Ransomware Spotlight: TargetCompany
- Email Threat Landscape Report: Cybercriminal Tactics, Techniques That Organizations Need to Know
- Preventing an Imminent Ransomware Attack With Early Detection and Investigation
- Inside the Halls of a Cybercrime Business
- Securing Cloud-Native Environments with Zero Trust: Real-World Attack Cases