Case Study
How to Simulate a Web Skimming Attack On Your Website
Ensighten eGuide How to Simulate a Web Skimming Attack On Your Website June 20202 Prerequisites for a successful attack While web skimming attacks vary greatly in their implementation method, they still revolve around a basic principal of exfiltrating user data from a website when the site is being rendered on a user’s browser. In order for an attack to take place, there needs to be two things possible: 1. An attacker needs to be able to inject malicious code either directly into a website or into one of the third-party components being used by a website 2. The malicious code, when running within a user’s browser, needs to be able to send the data which it captures to a remote network location Most organizations put technologies and policies in place to prevent the first of the