Silent Skimmer: Chinese-Speaking Threat Actor Expands Credit Card Skimming Campaign

Silent Skimmer, a sophisticated Chinese-speaking threat actor, has recently expanded its credit card skimming campaign beyond the Asia/Pacific region, targeting ecommerce sites in North and Latin America. This expansion points to the evolving tactics and global reach of cybercriminals. The threat actor has been gaining unauthorized access to a wide range of websites across multiple industry sectors by exploiting vulnerabilities in web applications, similar to tactics previously employed by the notorious Hafnium group involved in cyber espionage campaigns.

Exploitation of vulnerabilities

Silent Skimmer’s success in breaching targeted websites lies in its ability to exploit vulnerabilities in web applications. The threat actor has demonstrated adeptness in finding and utilizing these vulnerabilities, including one notable exploit used by the Hafnium group. By leveraging these vulnerabilities, Silent Skimmer gains unauthorized access to websites, bypassing security measures set in place by unsuspecting organizations.

Goal of Attacks

The primary goal of Silent Skimmer’s attacks is to gain access to payment pages on targeted e-commerce sites. Once within these payment pages, the threat actor drops malware carefully designed to steal credit card numbers from online shoppers. By successfully compromising these sensitive payment pages, Silent Skimmer gains access to a wealth of valuable financial data that can be used for fraudulent activities.

Silent Skimmer Campaign

The ongoing campaign orchestrated by Silent Skimmer has been aptly named “Silent Skimmer” by security researchers at BlackBerry. This naming reflects both the technical complexity of the campaign and the potential involvement of an advanced threat actor. The meticulous execution and sophisticated tactics employed by Silent Skimmer indicate that this is not your typical run-of-the-mill cybercriminal operation.

History of Magecart

Silent Skimmer’s campaign aligns with the recent modus operandi of Magecart, a loose collection of hacking groups notorious for stealing payment card data from millions of online shoppers worldwide. Magecart has been a persistent threat, exploiting vulnerabilities in website infrastructure to carry out their skimming activities. The expansion of Silent Skimmer’s operations is just another chapter in the long-standing legacy of Magecart’s illicit endeavors.

Exploited vulnerabilities

Silent Skimmer has specifically targeted websites hosted on Microsoft’s Internet Information Services (IIS) Web server software. Among the vulnerabilities exploited, one particularly concerning vulnerability is CVE-2019-18935. This critical remote code execution flaw in Telerik UI has also been utilized by other threat groups like Hafnium and Vietnam’s XE Group. The exploitation of shared vulnerabilities across multiple threat actors demonstrates the need for organizations to promptly address and patch these vulnerabilities to protect their systems and customers.

Tools and techniques

To carry out their operations, Silent Skimmer employs a series of sophisticated tools and techniques. The threat actor utilizes a wide array of tools for privilege escalation, remote access, remote code execution exploits, malware staging and downloading, as well as post-exploit activities. Remarkably, Silent Skimmer heavily relies on legitimate open-source tools, binaries, and scripts, further complicating the detection and attribution of their activities.

Command-and-Control Infrastructure

Silent Skimmer demonstrates an adaptive nature when it comes to their command-and-control (C2) infrastructure. The threat actor adjusts their C2 infrastructure based on the geolocation of their victims, deploying virtual private servers (VPS) as C2 servers. By using VPS hosted in the same region or country as the victim, Silent Skimmer blends their malicious traffic with legitimate traffic, making it harder to identify and mitigate their presence.

Impact and consequences

The repercussions of Silent Skimmer’s credit card skimming campaign are profound. For affected e-commerce sites, the breach of their payment pages can result in reputational damage, financial loss, and potential regulatory consequences. Additionally, online shoppers who have fallen victim to Silent Skimmer may face financial fraud and unauthorized use of their credit card information. Financial institutions also bear the burden of potential losses and increased efforts to combat fraud.

The expansion of Silent Skimmer’s credit card skimming campaign highlights the ever-present threat posed to e-commerce websites globally. The increasing complexity and adaptability of threat actors like Silent Skimmer necessitate heightened awareness and cybersecurity measures. Organizations should prioritize the timely patching of web application vulnerabilities, implement robust security protocols, and continuously monitor and detect any signs of compromise to protect their customers’ sensitive information. Collaboration between businesses, security researchers, and law enforcement agencies is crucial in combating the persistent and evolving threat of credit card skimming attacks.

Explore more

Maryland Data Center Boom Sparks Local Backlash

A quiet 42-acre plot in a Maryland suburb, once home to a local inn, is now at the center of a digital revolution that residents never asked for, promising immense power but revealing very few secrets. This site in Woodlawn is ground zero for a debate raging across the state, pitting the promise of high-tech infrastructure against the concerns of

Trend Analysis: Next-Generation Cyber Threats

The close of 2025 brings into sharp focus a fundamental transformation in cyber security, where the primary battleground has decisively shifted from compromising networks to manipulating the very logic and identity that underpins our increasingly automated digital world. As sophisticated AI and autonomous systems have moved from experimental technology to mainstream deployment, the nature and scale of cyber risk have

Ransomware Attack Cripples Romanian Water Authority

An entire nation’s water supply became the target of a digital siege when cybercriminals turned a standard computer security feature into a sophisticated weapon against Romania’s essential infrastructure. The attack, disclosed on December 20, targeted the National Administration “Apele Române” (Romanian Waters), the agency responsible for managing the country’s water resources. This incident serves as a stark reminder of the

African Cybercrime Crackdown Leads to 574 Arrests

Introduction A sweeping month-long dragnet across 19 African nations has dismantled intricate cybercriminal networks, showcasing the formidable power of unified, cross-border law enforcement in the digital age. This landmark effort, known as “Operation Sentinel,” represents a significant step forward in the global fight against online financial crimes that exploit vulnerabilities in our increasingly connected world. This article serves to answer

Zero-Click Exploits Redefined Cybersecurity in 2025

With an extensive background in artificial intelligence and machine learning, Dominic Jainy has a unique vantage point on the evolving cyber threat landscape. His work offers critical insights into how the very technologies designed for convenience and efficiency are being turned into potent weapons. In this discussion, we explore the seismic shifts of 2025, a year defined by the industrialization