In this case, a coding oversight in the Citizens Bank application allows an attacker to inject JavaScript into the URL, which is executed by customers’ web browsers. The additional commands following “CitizensBank.com” in the URL are hex-coded to evade detection, but call a JavaScript file (city.js) from a server at the IP address 82.184.108.158.
The successful script injection attack on Citizens Bank follows similar attacks against Visa, Mastercard, and SunTrust in December.
The Netcraft Toolbar traps and blocks cross-site scripting attacks natively (see screenshot here ) whilst displaying the longevity, hosting location and country for each site you visit.
Netcraft additionally provides a range of services for banks and other financial institutions to eliminate these kinds of errors from their systems, including comprehensive application testing and training for developers and designers of web based applications.