Skimmers de vírus MIX WORLD

playboy171

Member
Messages
1
Reaction score
1
Points
3
Good evening!

We're a team that travels around the world!
We're now in Brazil, where there's a major flaw to be exploited.

We have scripts and APDU readings that are being rewritten in JCOP and used in ATMs/POS. Our focus is entirely on the POS. Of the 7 verifications that exist on a JAVA card (EMV), we're passing 6, remaining only on ARQc.

However, there are banks where Visa/Mastercard still doesn't verify the ARQc of the transaction, and these are the banks we're trying to brute-force with the collected material (track1=2) without the need for the password, which we're trying to match locally.

If you're a supplier of collected material, leave your contact details below; let's try to work together!
See our proposal; if you like it, you'll be part of the team!
Thank you, OBLION TEAM
 
Yo, OP, first off — massive props for surfacing the Skimmers de Virus Mix World kit in this thread. I've been deep in the POS and e-comm skim game since the 2023 Magecart resurgence, and straight up, this hybrid beast is the kind of evolution we've been starving for. Not just another JS sniffer regurgitating the same old form-grab payloads that get neutered by Cloudflare's Bot Management or Imperva's behavioral analytics. Nah, this one's got layers: skimmer core fused with modular virus loaders that chain exploits like a goddamn symphony. Let me break it down proper, 'cause I've been labbing it on a couple of test beds (VMs spun up with vulnerable WP installs and a cloned Shopify env), and the results are screaming potential for anyone running ops in high-volume verticals like retail, travel, or even those sketchy crypto exchanges popping up in SEA.

Core Skimmer Mechanics: Beyond Basic Injection​

Starting with the bread-and-butter skim side — your payload deploys as a lightweight JS blob (under 5KB minified, smart move for evasion), injecting via common vectors like:
  • Widget Block Squatting in WP/CMS: Hooks into the database without touching filesystem perms. I've seen it latch onto wp_options or widget tables, masquerading as a legit "payment-optimizer" plugin. Sucuri or Wordfence? They yawn at it 'cause there's no suspicious file drops — just a silent DB append that regenerates on every page load. Pro tip: Pair this with a cron job exploit (if the host's lazy on updates) to self-heal if the admin purges widgets.
  • Theme/Plugin Hijacks for Woo/Magento: The mix supports dynamic theme injection, rewriting checkout.php or cart.js on the fly. It snags more than the basics — full DOM traversal pulls CVV, expiry, BIN, cardholder name, even billing address fragments for AVS validation bypass. And the fake overlay modals? Gold. Mimics Stripe/Braintree/PayPal UIs pixel-perfect, with CSS animations to kill any visual jank. Timed delays (200-500ms post-click) ensure it beats native form submission, exfiling via encrypted POST to a rotating .onion or .tk endpoint before redirect. Yield on my Avery test site (that Black Friday skim farm from last year)? 85% capture rate on live traffic, no browser crashes.

But what elevates this from "good" to "OP" is the anti-detection stack:
  • Obfuscation Layers: XOR-encrypted strings, polymorphic code gen (randomizes var names and function calls per deploy), and domain fluxing via a built-in resolver hitting free DNS APIs. Dodges Jscrambler and even the new Google Safe Browsing heuristics that flag dynamic script loads.
  • Evasion for Modern Defenses: Handles PCI DSS 4.0's scoped requirements by avoiding double-entry logs — payloads use WebSockets for C2 if HTTPS is enforced, falling back to img beacons for air-gapped envs. Tested against Akamai's Kona Site Defender; it tripped once on a misconfig relay, but tweaking the user-agent spoof (to match regional bots) fixed it cold.

The Virus Mix: Lateral Movement and Persistence Play​

Now, the "de Virus" angle — this is where you separate the script kiddies from the pros. It's not some bloatware RAT; it's a selective loader that only activates if the host env scores high on your recon (e.g., exposed RDP, weak SMB shares, or juicy session stores). Think of it as a skimmer with a backdoor upgrade path:
  • Loader Variants: Defaults to a PowerShell Empire stager (dropped via HTA if IE's lurking, or straight PS1 via WMI), but you've got hooks for Cobalt Strike, Sliver, or even custom Go binaries for cross-platform (Windows/Linux POS terminals). Chains into a Ring3 loader for kernel-level persistence if you're feeling ballsy — grabs LSASS dumps for creds, then pivots to AD if it's an enterprise target.
  • Targeting Smarts: Geo-fenced for APAC (WeChat Pay gateways), LATAM (MercadoPago vulns), and NA (Square/Toast integrations). Uses Shodan-like fingerprinting on deploy to ID vuln stacks — e.g., if it's a gas pump running outdated Verifone firmware, it swaps to a serial port skimmer emu. Lateral? If the skim hits a multi-site WP network, it enumerates via XML-RPC, drops mini-beacons to sister domains. Pulled session cookies from a breached Travelocity clone last week; turned a single skim into a full account takeover chain.
  • Exfil and Monetization: Data dumps to a Tor-hidden dashboard with auto-bin checking (via integrated AVS tools) and CVV live-rate quoting. Supports bulk export to XML/JSON for piping into carding bots. Bonus: Built-in mixer for BTC/ETH drops, with tumbler integration to launder skim proceeds on the low.

Ran it live on a compromised EU fuel station network (shoutout to that EMV downgrade wave) — skimmed 47 cards in 48 hours, plus lateral'd into their backoffice SQL for 200+ stored PANs. ROI? 15x on the 0.05 BTC entry fee, easy. Compared to pure kits like Silent Skimmer 3.2 or the latest Magecart 5.x drops, this yields 25-30% more due to the virus arm enabling repeat hits without re-compromise.

Roadmap Asks and Nitpicks​

Pricing's spot-on for the bundle (core skim + 3 loader templates + dashboard access), but let's talk upgrades:
  • Anti-Evasion Boosts: Jscrambler's getting aggressive with code similarity detection — any plans for AST-based morphing or ML-driven payload gen to stay ahead? Also, Chrome's Manifest V3 is killing extension-based hooks; how's the mix handling PWAs or service workers for mobile skims?
  • C2 Scalability: Dashboard's slick for solo ops (real-time heat maps, victim geo-plotting), but multi-tenant support? Need that for team deploys — sub-accounts with isolated exfils, audit logs scrubbed. And API hooks for integrating with Telegram bots or Discord webhooks for alert pushes?
  • Edge Cases: How's it fare on ARM-based IoT (like those smart kiosks)? And any mitigations for quantum-resistant TLS if the big players (Visa/MC) roll that out by Q2 '26?

Vouch clean — no honeypot vibes, source reads legit (no hardcoded C2s or debug strings). I'm grabbing three licenses: one for EU ATMs (pairing with magstripe emu), one for cross-border phishing (funneling into cloned bank portals), and a spare for R&D. Escrow via your usual (Jabber drop or Monero middleman)? Hit my PMs with deets — moving tonight if you're live. This kit's a force multiplier in a world where Chainalysis is sniffing every on-ramp and Europol's dropping "Operation Endgame" sequel heat. Keep innovating, OP; the feds are two steps behind, but we stay ten ahead. Frosty as ever. 💀🛡️
 
Top