Connect with us

Technology

Web skimming attacks target major payment networks

Published

on

Web skimming attacks target major payment networks

NEWYou can now listen to Fox News articles!

Online shopping feels familiar and fast, but a hidden threat continues to operate behind the scenes. 

Researchers are tracking a long-running web skimming campaign that targets businesses connected to major payment networks. Web skimming is a technique where criminals secretly add malicious code to checkout pages so they can steal payment details as shoppers type them in. 

These attacks work quietly inside the browser and often leave no obvious signs. Most victims only discover the problem after unauthorized charges appear on their statements.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY

Web skimming attacks hide inside checkout pages and steal card details as shoppers type them in. (Kurt “CyberGuy” Knutsson)

What Magecart is and why it matters

Magecart is the name researchers use for groups that specialize in web-skimming attacks. These attacks focus on online stores where shoppers enter payment details during checkout. Instead of hacking banks or card networks directly, attackers slip malicious code into a store’s checkout page. That code is written in JavaScript, which is a common type of website code used to make pages interactive. Legitimate sites use it for things like forms, buttons and payment processing.

In Magecart attacks, criminals abuse that same code to secretly copy card numbers, expiration dates, security codes and billing details as shoppers type them in. The checkout still works, and the purchase goes through, so there is no obvious warning sign. Magecart originally described attacks against Magento-based online stores. Today, the term applies to web-skimming campaigns across many e-commerce platforms and payment systems.

Which payment providers are being targeted?

Researchers say this campaign targets merchants tied to several major payment networks, including:

Advertisement
  • American Express
  • Diners Club
  • Discover, a subsidiary of Capital One
  • JCB Co., Ltd.
  • Mastercard
  • UnionPay

Large enterprises that rely on these payment providers face a higher risk due to complex websites and third-party integrations.

700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

Criminals use hidden code to copy payment data while the purchase still goes through normally. (Kurt “CyberGuy” Knutsson)

How attackers slip skimmers into checkout pages

Attackers usually enter through weak points that are easy to overlook. Common entry paths include vulnerable third-party scripts, outdated plugins and unpatched content management systems. Once inside, they inject JavaScript directly into the checkout flow. The skimmer monitors form fields tied to card data and personal details, then quietly sends that information to attacker-controlled servers.

Why web skimming attacks are hard to detect

To avoid detection, the malicious JavaScript is heavily obfuscated. Some versions can remove themselves when they detect an admin session, which makes inspections appear clean. Researchers also found the campaign uses bulletproof hosting. These hosting providers ignore abuse reports and takedown requests, giving attackers a stable environment to operate. Because web skimmers run inside the browser, they can bypass many server-side fraud controls used by merchants and payment providers.

Who Magecart web skimming attacks affect most

Magecart campaigns impact three groups at the same time:

Advertisement
  • Shoppers who unknowingly give up card data
  • Merchants whose checkout pages are compromised
  • Payment providers that detect fraud after the damage is done

This shared exposure makes detection slower and response more difficult.

NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY

Simple protections like virtual cards and transaction alerts can limit damage and expose fraud faster. (Kurt “CyberGuy” Knutsson)

How to stay safe as a shopper

While shoppers cannot fix compromised checkout pages, a few smart habits can reduce exposure, limit how stolen data is used, and help catch fraud faster.

1) Use virtual or single-use cards

Virtual and single-use cards are digital card numbers that link to your real credit or debit account without exposing the actual number. They work like a normal card at checkout, but add an extra layer of protection. Most people already have access to them through services they use every day, including:

Major banks and credit card issuers that offer virtual card numbers inside their apps

Advertisement

Mobile wallet apps like Apple Pay and Google Pay generate temporary card numbers for online purchases, keeping your real card number hidden.

Some payment apps and browser tools that create one-time or merchant-locked card numbers

A single-use card typically works for one purchase or expires shortly after use. A virtual card can stay active for one store and be paused or deleted later. If a web skimming attack captures one of these numbers, attackers usually cannot reuse it elsewhere or run up repeat charges, which limits financial damage and makes fraud easier to stop.

2) Turn on transaction alerts

Transaction alerts notify you the moment your card is used, even for small purchases. If web skimming leads to fraud, these alerts can expose unauthorized charges quickly and give you a chance to freeze the card before losses grow. For example, a $2 test charge on your card can signal fraud before larger purchases appear.

3) Lock down financial accounts

Use strong, unique passwords for banking and card portals to reduce the risk of account takeover. A password manager helps generate and store them securely.

Advertisement

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

4) Install strong antivirus software

Strong antivirus software can block connections to malicious domains used to collect skimmed data and warn you about unsafe websites.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

5) Use a data removal service

Data removal services can reduce how much personal information is exposed online, making it harder for criminals to pair stolen card data with full identity details.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Watch for unexpected card activity

Review statements regularly, even for small charges, since attackers often test stolen cards with low-value transactions.

Advertisement

Kurt’s key takeaways

Magecart web skimming shows how attackers can exploit trusted checkout pages without disrupting the shopping experience. While consumers cannot fix compromised sites, simple safeguards can reduce risk and help catch fraud early. Online payments rely on trust, but this campaign shows why that trust should always be paired with caution.

Does knowing how web skimming works make you rethink how safe online checkout really is?  Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

DJI’s new Mic Mini 2 adds colorful covers to help them blend in

Published

on

DJI’s new Mic Mini 2 adds colorful covers to help them blend in

As with the Osmo Pocket 4 and recent Lito drones, DJI has no plans to release the Mic Mini 2 in the US, but it’s now available in most other markets. Pricing starts at €59 (around $69) for a bundle that includes a single mic transmitter, a compact USB-C wireless receiver, and a smaller charging case. There are several additional bundles available, including a €99 (around $116) option with two mic transmitters, a larger version of the wireless receiver that can be used with cameras, and a charging case large enough to accommodate them all. Obsidian black and glaze white magnetic covers are included, while 12 more colorful alternatives are sold separately.

The Mic Mini 2 transmitters are slightly larger and a gram heavier than the originals as a result of the redesign that accommodates the covers. But they’re much smaller than the Insta360 Mic Pro’s transmitters that will feature a customizable color E Ink screen. Battery life remains the same at 11.5 hours for the Mic Mini 2 with ANC turned off and 10.5 hours for the receiver, while the wireless transmission distance still maxes out at just over 1,312 feet. There’s still no redundant on-mic recording, but DJI teased a Mic Mini 2S version with that feature as part of today’s announcement that it claims will be announced this summer.

Continue Reading

Technology

You could get paid from Google’s Android data lawsuit

Published

on

You could get paid from Google’s Android data lawsuit

NEWYou can now listen to Fox News articles!

If you use an Android phone, there is a good chance this case affects you. Google has agreed to a $135 million settlement over claims that its Android system used people’s cellular data without permission. The part that caught our attention is when it allegedly happened.

According to the lawsuit, these data transfers could take place in the background, even when your phone was not in use. Most people assume that if their screen is off, nothing is happening. That isn’t always the case.

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

The lawsuit claims Android software sent data to Google in the background, even when the phone was not in use. (John Keeble/Getty Images)

Advertisement

 

What the lawsuit says your Android phone was doing

At the center of this case is how Android handled background activity. The lawsuit claims Android devices were sending information back to Google servers without clear user consent. This reportedly happened over cellular networks, which means it may have used data you were paying for.

That detail matters. If something runs over Wi Fi, most people do not think twice about it. Cellular data is different. It is limited for many users and often tied to monthly costs.

The plaintiffs argue that Google could have restricted these transfers to Wi Fi. Instead, they say the system used cellular connections, which shifted the cost to users. Google has denied wrongdoing but agreed to settle the case.

“We are pleased to resolve this case, which mischaracterized standard industry practices that keep Android safe. We’re providing additional disclosures to give people more information about how our services work,” José Castañeda, a Google spokesperson, told CyberGuy.

 

Who may be included in the settlement?

This case covers a huge number of people. If you used an Android device on a cellular network at any point after November 12, 2017, there is a good chance you are part of the group. The only major exception is if you are already included in a similar case called Csupo v. Google LLC. Estimates suggest around 100 million users could qualify. That makes this one of the larger consumer tech settlements tied to everyday phone use.

Advertisement

 

How much you might actually receive

Before you start planning how to spend it, this is likely to be a modest payment. The settlement fund is $135 million. When that is divided across millions of people, the amount per person will depend on how many claims are filed. In most cases like this, payments tend to be small. Think of it as getting reimbursed for something you did not realize was costing you.

ALLSTATE SUED FOR ALLEGEDLY TRACKING AND SELLING 45M AMERICANS’ LOCATION DATA

The case focuses on whether those background transfers used cellular data that users were paying for. (Kury “CyberGuy” Knutsson)

 

How to claim your payment

The process is already underway, but it is simpler than most people expect. In many cases, you do not need to file a full claim form to be included. If you qualify, you are already part of the settlement unless you choose to opt out.

That said, there are a few steps worth taking to make sure you actually get paid.

Advertisement
  • Start by checking your email or physical mail for a notice about the settlement. Some users are receiving a class member ID or notice code, which makes the process faster.
  • Next, visit the official settlement website at federalcellularclassaction.com and confirm your eligibility. This is also where you can enter or update your payment details. You will typically be able to choose how you want to receive your money, including options like direct deposit or popular payment apps.
  • If you do nothing, you may still receive a payment automatically, but there is a higher chance of delays or missed payments if your information is outdated. You only need to take extra steps if you did not receive a notice, your contact details have changed, or you want to opt out or object to the settlement.

 

The timeline you need to know

There are a couple of important dates to keep in mind. The deadline to opt out or object to the settlement is May 29, 2026. The final approval hearing is scheduled for June 23, 2026. If the court approves the deal, payments will follow after that process wraps up.

 

Why this situation matters beyond the settlement

This case taps into something bigger than one payout. Smartphones are designed to stay connected at all times. That includes background activity that most people never see. While that constant connection powers useful features, it also creates gray areas around consent and cost.

Situations like this raise a simple question. How much do you really know about what your phone is doing behind the scenes? It also puts pressure on companies to be clearer about how data is used and when it is being transmitted.

We reached out to Google for comment, but did not hear back before our deadline. 

The $135 million settlement could lead to payments for Android users who used cellular data after 2017. (Kurt “CyberGuy” Knutsson)

 

What the Android data lawsuit means for you

Even if the payout ends up being small, the takeaway here matters more than the money. Your phone may be using data in ways you do not notice. That includes apps you rarely open and system services running in the background. Taking a few minutes to check your settings can give you more control.

Advertisement

 

Check which apps are using background data

(Settings may vary depending on device manufacturer)

Samsung/Android: Go to Settings > Connections > Data usage > Mobile data usage >  then tap an app to see its data use and background activity.

 

Limit background data for specific apps

(Settings may vary depending on device manufacturer)

Samsung/Android: Go to Settings > Connections > Data usage > Mobile data usage > tap an app > toggle Allow background data usage off

This stops the app from using cellular data when you are not actively using it.

Advertisement

Reduce data use for updates and backups

(Settings may vary depending on device manufacturer)

Go to Settings > Software update > Auto download > Using Wi-Fi only

For apps, open the Google Play Store > tap your profile > Settings > Network preferences > App download preference > choose Over Wi-Fi only > OK

These small changes can help you avoid using cellular data without realizing it and give you more visibility into what your phone is doing behind the scenes.

Advertisement

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: CyberGuy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

 

Kurt’s key takeaways

This case is a reminder that the devices we rely on every day are doing more than we see. Most of the time, that works in your favor. Sometimes, it raises questions about transparency and control. Google chose to settle without admitting fault. That leaves room for debate about what really happened. It also highlights how quickly technology can outpace what users expect or understand. As phones become even more connected, these kinds of cases will likely keep coming.

Should companies like Google be allowed to use your cellular data in the background without clear permission, even if it powers features you rely on every day? Let us know your thoughts by writing to us at CyberGuy.com

Advertisement

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Google is testing AI chatbot search for YouTube

Published

on

Google is testing AI chatbot search for YouTube

Google is trying out an AI Mode-like search experience for YouTube. The company is now testing “a new way to search on YouTube that feels more like a conversation,” with results pulling in things like longform videos, YouTube Shorts, and text about what you’re searching for. The “experiment” is now available if you’re a YouTube Premium subscriber in the US who is 18 or older.

I turned it on for my account. Now, in the search bar, I see an “Ask YouTube” button, and clicking the search bar shows prompts to ask like “funny baby elephant playing clips,” “summary of the rules of volleyball,” and “short history of the Apollo 11 moon landing.” If I keep the search box blank but click the Ask YouTube button, YouTube takes me to a full page with suggested searches and a text box to ask a question.

When you search with Ask YouTube, YouTube briefly shows a mostly-blank page with a loading icon, and after a few seconds, fills it out with text and details. I tested it with the “short history of the Apollo 11 moon landing” prompt. At the top of the results was a bunch of text summarizing the mission, including a bulleted list of milestones like the date of the lunar landing and Neil Armstrong’s first step on the Moon. Then, the page included a video about the launch timestamped to a section about the launch day from a channel called “The Life Guide,” followed by galleries of videos under headers like “From Launch to Splashdown,” “Historic Footage and Behind-the-Scenes,” and a series of Shorts about “Moments on the Surface.” (I assume YouTube is pulling the text for these sections from the videos highlighted in the search results.)

At the end, the page has a few more suggested prompts, including “Who were the Apollo 11 astronauts” and (perhaps worryingly) “Apollo 11 conspiracy theories,” and a text box I can use to ask a follow-up question or start a new search. I clicked the “Who were the Apollo 11 astronauts” and got a new, slightly differently-formatted set of results, including a grid with background about astronauts Neil Armstrong, Buzz Aldrin, and Michael Collins. Searching for “Apollo 11 conspiracy theories” just showed a typical list of YouTube search results, however.

I threw Ask YouTube another test to see how it fared with something I’m very familiar with: Valve’s new Steam Controller, which I published a review of today. I asked, “What is the Steam Controller,” and YouTube gave an overview of the controller, pointed to Valve’s new video about the controller, and highlighted both longform reviews and a “Quick Hands-On Reviews” section featuring Shorts (including our new Short published today and one from last November).

Advertisement

It was all mostly right, but I did catch a factual flub: YouTube claimed that the old, discontinued Steam Controller had no joysticks, when it actually has one. It was a reminder that, as potentially useful as these AI-created search result pages might seem, you need to do your due diligence to make sure they’re accurate.

Continue Reading
Advertisement

Trending