All Posts
Malware
Research
1
min read

2019 Attack Predictions for the Payment Sector

The Cyber Crime in the Payments Sector report from Anomali Labs explores trending threats, a strategic industry outlook, and recommendations for protecting organizations.
Published on
January 10, 2019
Table of Contents


Anomali Labs published this week a report, “Cyber Crime in the Payments Industry,” that examines threat trends affecting this sector. The report, available for download, details attacks and techniques, and provides recommendations for organizations that process credit card transactions.

The payments industry, including retail, hospitality, restaurants and payment processors, has long been a target for fraud and cybercrime. For malicious actors the attraction is obvious as successful attacks can produce significant rewards. One recent ATM Cash-Out scheme involved cloning of 450 cards within a 24-hour period and withdrawal of over $11.5 million across 28 countries. The Magecart cybercrime group leveraged vulnerabilities in web forms on merchant websites. These undetected breaches allowed credit card payment information to be collected from unsuspecting clients for months.

In recent years payment processors have adopted EMV (Europay, Mastercard and Visa), a credit card payment processing standard that leverages an embedded chip to enable encrypted transactions and facilitate secure storage. This advance in payment security has pushed cybercriminals to find other soft targets - specifically a move away from brick-and-mortar retailers, where customers must have physical possession of the card to online and e-commers merchants where Card Not Present (CNP) transactions take place. Visa Threat Intelligence estimates that over 60% of reported breaches worldwide now involve smaller merchants.

The Cyber Crime in the Payments Sector report from Anomali Labs explores these trends and threats and provides a strategic outlook for the sector and recommendations for protecting organizations.

Download Report

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All