The Green Sheet Online Edition

July 28, 2025 • 25:07:02

Demystifying ecommerce skimming: What merchants need to know

Earlier this year, attackers quietly exploited a payment processor’s API, injecting malicious scripts into legitimate merchant checkout pages, capturing customer credit card data before it was successfully processed. This is just the latest evolution in e-skimming, a threat many merchants still don’t fully understand, even as new PCI DSS v4.0.1 requirements attempt to address it.

For merchants, breaches like this can lead to significant financial losses, reputational damage and potential legal liabilities. For customers, it’s personal: unauthorized transactions and identity theft.

Scripts, hidden windows of vulnerability

Payment pages today rely on a complex web of scripts for analytics, marketing, form validation and payment processing. These scripts interact with the consumer’s browser, often pulling in content from multiple third- or even fourth-party sources. Every added script is a potential open window for attackers.

The guidance on PCI DSS v4.0.1 requirements 6.4.3 and 11.6.1, has changed more than once in just a few months. This has left many acquirers, merchants and their third-party service providers (TPSPs) wondering: do these new requirements apply to me? If so, who’s responsible for covering them, me or my TPSP?

The confusion is real, and the risk is growing.

Why the new PCI DSS requirements matter

PCI DSS v4.0.1 addresses e-skimming head-on with two new mandates:

These requirements are sound, but implementation often reveals confusion, especially when TPSPs are involved.

TPSPs: Who’s doing what?

Many merchants use ecommerce platforms or web hosting partners to manage key elements of their checkout page. But this creates a common vulnerability: miscommunication.

This kind of thing happens all the time. For example, a merchant is using an ecommerce shopping cart supported by a third party. The merchant thinks the TPSP is responsible for patching it; the TPSP assumes it’s on the merchant. No one patches it, and that’s all it takes for a breach to happen. We see the e-skimming threat in a similar light.

What merchants should be asking

To assess areas of responsibility and potential vulnerability, merchants should ask the following questions:

Take control: Four steps to protect your business and customers

Complexity is unavoidable, but so is the need for vigilance. Merchants can keep this simple by focusing on what they can control:

This isn’t just about ticking boxes. It’s about owning your security, even when third-party partners are involved. Security gaps can emerge quickly. Compliance doesn’t guarantee security, but visibility helps.

If you don’t know who’s monitoring your scripts or patching your payment tools, chances are no one is. Now is the time to find out.

End of Story

As director, PCI compliance, Aperia Compliance, an IXOPAY company, Chris Bucolo helps merchants and partners navigate and stay compliant with PCI DSS requirements. He has served on PCI working groups and works closely with stakeholders to turn complexity into clarity. Please contact him by email at c.bucolo@ixopay.com or LinkedIn at www.linkedin.com/in/chrisbucolo.

Notice to readers: These are archived articles. Contact information, links and other details may be out of date. We regret any inconvenience.

skyscraper ad