North Korea wants to steal your credit cards, researchers say: What to know

north korea flag and computer code
(Image credit: Shutterstock)

North Korean government-backed hackers are behind a wave of online credit-card "skimming" attacks on American and European consumers that has been going on for more than a year, researchers say.

According to new research from Dutch IT security firm Sansec, the infamous Lazarus hacking group, also known as Hidden Cobra, has been targeting and injecting payment-card-skimming code into a range of  e-commerce stores in the U.S., Europe and Iran beginning in May 2019.

  • The best antivirus apps to keep all your devices safe
  • Best VPN: add an extra layer of security with a virtual private network
  • Just in: Mozilla VPN –  all you need to know and how it compares to the rest

Digital skimming, now commonly called "Magecart," attacks involves crooks hacking into e-commerce websites and injecting malicious code that is used to steal customers' credit-card details as they shop online.

“Previously, North Korean hacking activity was mostly restricted to banks and South Korean crypto[currency] markets, covert cyber operations that earned hackers $2 billion, according to a 2019 United Nations report,” said Sansec researchers. “As Sansec’s new research shows, they have now extended their portfolio with the profitable crime of digital skimming.”

The Lazarus Group is widely believed to be behind the 2014 attack that stole and destroyed data at Sony Pictures, the 2016 theft of $100 million from the Bank of Bangladesh and the 2017 WannaCry disk-wiping worm that caused hundreds of millions of dollars' worth of damage worldwide.

  • More: Sure your Apple device is secure? Check out what a Mac VPN offers

Large-scale attacks

Sansec claims the hackers were able to “gain access to the store code of large retailers”, including U.S. fashion accessories retailer Claire’s. 

The researchers aren’t exactly sure how the Lazarus Group was able to hack into the payment systems of these retailers, but suggested that the hackers leveraged spear phishing attacks to “obtain the passwords of retail staff".

“Using the unauthorized access, HIDDEN COBRA injects its malicious script into the store checkout page,” explained the researchers. 

“The skimmer waits for keystrokes of unsuspecting customers. Once a customer completes the transaction, the intercepted data -- such as credit card numbers -- are sent to a HIDDEN COBRA-controlled collection server."

Global targets

To launch and make money from these attacks, the hackers set up a global exfiltration network.

“This network utilizes legitimate sites that got hijacked and repurposed to serve as disguise for criminal activity," the researchers explained. 

“The network is also used to funnel the stolen assets so they can be sold on dark web markets. Sansec has identified a number of these exfiltration nodes, which include a modeling agency from Milan, a vintage music store from Tehran and a family-run bookstore from New Jersey.”

The attacks were traced back to North Korea via malicious domains like technokain.com, Darvishkhan.net and areac-agr.com.

“Sansec has found proof of global skimming activity that has multiple, independent links to previously documented, North Korea attributed hacking operations. Sansec believes that North Korean state sponsored actors have engaged in large scale digital skimming activity since at least May 2019.”

It's not easy to see whether a particular website has been compromised by credit-card skimmers, since the details are usually buried deep in the website's code. 

However, you should check your credit-card statements at least every month, and report anything amiss to your card's issuing organization -- usually a bank -- immediately. 

You also don't want to use debit cards online, as those withdraw money directly from your bank account, and crooks who get hold of debit-card numbers may try to clean out your account quickly before you or your bank have a chance to notice.

Nicholas Fearn is a freelance technology journalist and copywriter from the Welsh valleys. His work has appeared in publications such as the FT, the Independent, the Daily Telegraph, The Next Web, T3, Android Central, Computer Weekly, and many others. He also happens to be a diehard Mariah Carey fan!

Latest in Online Security
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Latest in News
Apple Watch Series 10
Future Apple Watch models could get a surprising new feature — what we know
iPhone 16 Pro vs iPhone 16 Pro Max in hand showing displays
Forget iPhone 17 — iPhone 18 could get this huge upgrade
The new Husqvarna iQ series robot lawn mower.
Husqvarna’s new robot mowers offer GPS for less
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Sunday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)