cybersecurity threats escalated globally this week, with significant incidents targeting payment systems, artificial intelligence platforms, and critical internet infrastructure. Security researchers identified a new wave of sophisticated attacks, including double-tap credit card skimmers, a data leak from an AI prompt management service, a record-breaking distributed denial-of-service attack, and a novel malware campaign exploiting Docker containers. These developments underscore a broadening attack surface affecting consumers, developers, and enterprises.
Double-Tap Skimmers Target Online Payments
A new variant of digital credit card skimming malware, dubbed “double-tap,” has been deployed on compromised e-commerce websites. This malware is designed to evade detection by executing its data theft routine only after a user interacts with the payment form twice. Security firms report that the skimmer captures sensitive payment information, including card numbers, CVV codes, and personal details, which is then exfiltrated to attacker-controlled servers. The technique represents an evolution in Magecart-style attacks, which directly target online shopping carts.
PromptSpy AI Service Suffers Data Exposure
PromptSpy, a platform used by developers to manage and optimize prompts for large language models, confirmed a data exposure incident. According to the company, a misconfigured database left user data accessible without proper authentication for a limited period. The exposed information included user email addresses, hashed passwords, and a collection of submitted AI prompts. PromptSpy stated it has secured the database and notified potentially affected users, advising them to change their passwords.
Record 30 Tbps DDoS attack Mitigated
A massive distributed denial-of-service attack, peaking at approximately 30 terabits per second, was launched against an undisclosed European organization. A leading DDoS mitigation service reported neutralizing the attack, which utilized a combination of compromised cloud instances and Internet of Things devices. The 30 Tbps scale marks one of the largest volumetric attacks ever recorded, demonstrating the continued increase in firepower available to malicious actors seeking to disrupt online services.
Malware Campaign Exploits Docker APIs
A new malware campaign is actively targeting misconfigured Docker API endpoints exposed to the internet. The attack automates the deployment of malicious containers that mine cryptocurrency and act as launch points for further network intrusion. Security analysts note the campaign scans for vulnerable hosts, deploys the container, and then attempts to spread laterally within the network. This incident highlights the security risks associated with improperly secured development and deployment infrastructure.
Broader Implications for Digital Security
The simultaneous emergence of these diverse threats illustrates the multifaceted nature of modern cyber risk. The skimmer attack directly impacts consumer financial security, while the PromptSpy incident raises concerns about data privacy in the burgeoning AI ecosystem. The unprecedented scale of the DDoS attack threatens the stability of essential online infrastructure, and the Docker malware campaign exploits foundational tools used in software development and cloud computing.
Industry experts emphasize that these events are not isolated but part of a continuous trend of increasing sophistication and frequency in cyber attacks. They stress the importance of basic security hygiene, including regular software updates, configuration audits, and user education on phishing and other social engineering tactics.
Expected Developments and Responses
Security vendors are expected to release updated signatures and detection rules for the double-tap skimmer and the Docker malware in the coming days. The company behind PromptSpy is likely to undergo a third-party security audit. The target of the large DDoS attack has not been publicly named, but law enforcement agencies in multiple jurisdictions often collaborate to investigate attacks of this magnitude. Organizations worldwide are advised to review their cloud and container security postures and ensure DDoS protection services are adequately provisioned.
Source: Various security research publications and vendor advisories.