Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Preparing for the 2022 fraud threat landscape

By David Capezza
cyber-freepik1170x658.jpg
December 8, 2021

Cybercriminals continue to evolve their tactics, developing more sophisticated ways to persistently target the global payments ecosystem. With the disruption of Joker’s Stash, Emotet, Netwalker, Egregor, TA505 and numerous other cybercrime underground operations, it’s essential that organizations prepare their cybersecurity postures for the inevitable introduction of new threat actors. 

While the past year may have brought an overall reduction of the fraud rate for some channels – such as the card-present channel, likely due to restrictions put in place on brick-and-mortar merchants as a result of the COVID-19 pandemic – threats against payment systems remain. Paired with the holiday shopping surge and a new normal in which customers are far more comfortable making digital purchases, payment providers, fintech firms merchants and suppliers need to understand the threat landscape if they hope to maintain positive customer experiences.

Heading into 2022 there are three key areas where security leaders need to be well-versed: innovations in eSkimming methods, intensifying pressure from ransomware campaigns on the payments ecosystem and the supply chain, and sophisticated enumeration attacks that impact and payments ecosystem.

 

Innovations in eSkimming

The surge in eCommerce payment volume has made eCommerce merchants an attractive target for eSkimming malware. During the first half of 2021, Visa observed that approximately 70% of at-risk payment accounts were comprised of card-not-present data as new techniques targeting eCommerce merchants and customer payment account data continued to crop up. 

Since 2020, threat actors have increasingly leveraged web shells to facilitate eSkimming attacks. Web shells are tools used to establish and maintain access to compromised servers, deploy additional malicious files, facilitate lateral movement within a victim’s network, and remotely execute commands. At least 45 eSkimming attacks using web shells were identified throughout 2020, and the trend persisted into 2021. 

Targeting vulnerabilities in popular eCommerce platforms persisted from 2020 into 2021, but with added innovation. In one case, threat actors deliberately scanned eCommerce sites that were already infected with eSkimmers and injected their own script to steal the data from the first threat actors. Such cases exemplified the dangers of running outdated and unpatched software.

Another evolution entails using publicly available jpeg image files to exfiltrate payment account data from an infected merchant website. In March 2021, researchers discovered a new eSkimming variant that infected the PHP source code from a popular eCommerce platform provider to steal customer data and store it encoded in an image hosted on the victim’s own website, uniquely combining two techniques observed in previous attacks. This tactic effectively enabled an attacker to retrieve stolen data while disguising the action as an innocuous image request.

Lastly, eSkimming campaigns continue to use the chat application Telegram to operate as a command and control (C2) within attacks. Using Telegram enables threat actors to easily access the C2 infrastructure and exfiltrate data using varying internet connected devices. Telegram also facilitates persistence and avoids detection as the application is often permitted by enterprise anti-virus solutions.

 

Ransomware Operations Ratchet Up the Pressure 

While it’s widely understood that ransomware persists as a significant threat, organizations need to be aware of new developments within ransomware attacks. In fact, ransomware operations are intensifying pressure on victims. After exfiltrating sensitive data and encrypting data and systems on a victim’s environment, ransomware operators continue to apply pressure on victim organizations: one example being the targeting of victims with distributed denial of service (DDoS) attacks. Known threat actors leveraging DDoS attacks in their campaigns include the Avaddon, SunCrypt, and RagnarLocker groups.

Financially motivated threat actors are increasingly targeting payment ecosystem entities with ransomware. Visa identified numerous global ransomware attacks against issuers, acquirers, and merchants. While ransomware actors are opportunistic and target any sensitive data, payment account data was specifically targeted and compromised in some of these attacks. Therefore, payments organizations need to be prepared and well-defended against evolving ransomware threats.

 

New Enumeration Attack Targets 

Enumeration is the scalable and programmatic automated testing of common payment fields via eCommerce transactions to effectively guess the full payment account number, CVV2, and/or expiration date. Enumeration enables actors to target numerous entities by exploiting the use of common third-party data. Threat actors carrying out enumeration attacks are increasingly targeting merchant service providers.

In one such case in early 2021, a new enumeration campaign targeted flower shops and florist merchants that shared a common third-party service provider, which supplied web design and other digital marketing services. The enumeration activity impacted 33 merchants and involved more than 2,500 enumerated transactions per merchant. While threat actors primarily targeted U.S. issuers in this campaign, the incident impacted issuers globally. The case also demonstrated how threat actors can exploit vulnerabilities in eCommerce merchant service providers to execute testing attacks against merchants.   

In another case, a new enumeration campaign in 2021 targeted the authentication stage of transactions on eCommerce merchants. This marked a divergence from most enumeration campaigns, which are conducted in the authorization stream. 

In authentication enumeration attacks, fraudsters identify a merchant that does not have adequate security controls, such as CAPTCHA, on their website. This enables the fraudsters to automate authentication attempts on targeted accounts and iterate through the payment account values. Merchants can leverage protocols to provide an extra layer of identity verification before authorization.

 

Threats Landscape Forecast for 2022 and Beyond

Cybercrime operations will continue to evolve and become more sophisticated throughout 2022, particularly as major cybercrime operations have been effectively disrupted as referenced earlier throughout the course of the 2021. Card present fraud will likely see an increase in the short-term, as COVID-19 related restrictions are eased and fraudsters increasingly target brick-and-mortar merchants with skimmers and point-of-sale malware. However, with the increase in secure acceptance technology, card present data has become less attractive to cybercriminals. Ultimately, cybercrime operations will continue to primarily focus on card-not-present data obtained through eSkimming, enumeration or other tactics targeting eCommerce environments. Ransomware will remain a persistent threat to ecosystem partners globally. 

KEYWORDS: cyber security fraud detection malware payments security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Capezza is the Senior Director of Payment Systems Intelligence at Visa.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • multicolor pyramid on red orange background

    The threat landscape and best practices for securing the edge

    See More
  • Water treatment facility security risks

    The threat landscape for the water industry

    See More
  • quantum

    A call to arms: Preparing for the quantum apocalypse

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products

Events

View AllSubmit An Event
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing