Many Christmas purchases can be done conveniently online from home. But be particularly careful when using your credit card: The Federal Criminal Police Office is currently recording a new wave of digital skimming and recommends increased vigilance.
What happens:
With digital skimming, also known as e-skimming, criminals steal online customers' credit card details unnoticed during the payment process in the online shop. They take advantage of security gaps in online shops.
Unlike classic skimming, with digital skimming the credit card data is not accessed through manipulated card readers. During digital skimming, the source code of web shops is manipulated in such a way that a copy of the credit card data entered is sent to the perpetrators. Other forms of payment are currently not affected. The payment process itself is usually completed as intended. Users and shop operators therefore usually do not notice the data theft.
So far, small and medium-sized online retailers, which usually use standardized shop systems, have been particularly affected
Protective measures against digital skimming:
Digital skimming is often difficult consumers
- Take your time during the payment process and pay attention to any anomalies.
- Be particularly critical if credit card details are requested unusually early in the payment process.
- If an online shop offers several payment options on the website, but these do not appear in the payment process, it may also be a manipulated input mask.
- If the input mask visually differs from the structure of the website or if a different language or an unusual translation is used, these can also be indications of digital skimming.
- Contact the shop operator if you notice any abnormalities during the payment process.
- If in doubt, choose alternative forms of payment and avoid using your credit card.
- If you have any evidence that your credit card information has been compromised, file a criminal report with your local police department.
Web shop operators also take precautions:
- Check the functionality of your payment processes regularly for any anomalies.
- Check your source code files regularly for unauthorized changes, for example through a checksum comparison.
- Use restrictive configuration for web resources.
- Name a technical contact on your website to whom your customers can report abnormalities and create awareness on your telephone hotline.
- Respond to reports from your customers.
- If your website has been compromised, file a criminal report with your local police department.
Article image: Pixabay
Source:
BKA
Also interesting: As part of an investigation by the BKA and the Frankfurt am Main Public Prosecutor's Office, the darknet platforms “BoyVids 6.0”, “Forbidden Love” and “Child Porn Market” were successfully shut down.
– BKA: Strike against darknet platforms
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

