EHA
Home Cyber Attack Hundreds of Online Stores Hacked to Steal Credit Card Details

Hundreds of Online Stores Hacked to Steal Credit Card Details

0

In a recent cybercrime campaign uncovered, attackers leveraged a novel JavaScript skimming tactic to target Magento online stores. 

The attack chain remains under investigation, but it involved exploiting an unidentified vulnerability, likely common across compromised stores, to inject malicious skimming code functioning as silent eavesdroppers, covertly capturing sensitive credit card information like numbers, expiration dates, and CVVs during customer checkout processes. 

After that, the stolen information was sent to a network consisting of more than twelve websites that were controlled by the individuals who committed the theft and were specifically designed to receive this confidential information. 

 content of the remotely loaded JavaScript

Because of this incident, consumers and e-commerce platforms are both reminded of the increased significance of maintaining a high level of cybersecurity vigilance. 

Consumers who frequently engage in online transactions should strongly consider implementing security solutions capable of detecting and blocking skimming attempts, which offer an extra layer of protection for users’ online financial transactions, mitigating the risk of falling victim to similar attacks. 

For e-commerce platforms like Magento, the incident highlights the critical role of prioritizing security updates and promptly patching vulnerabilities to minimize the attack surface for malicious actors.  

A proactive security posture that includes continuous vulnerability assessments and penetration testing is essential to identify and address potential weaknesses before they can be exploited. 

obfuscated JavaScript

Employing security measures like code obfuscation and input validation can further enhance the platform’s security posture by making it more difficult for attackers to inject malicious code and exploit vulnerabilities.

Beyond immediate mitigation efforts, the incident also emphasizes the importance of a multi-faceted approach for online store owners to maintain a secure e-commerce environment. 

By employing a comprehensive security strategy that incorporates these best practices, online store owners can significantly reduce the risk of falling victim to similar skimming attacks and protect their customers’ sensitive financial data. 

The yet-to-be-identified vulnerability exploited in this campaign underscores the potential for a wider attack surface. If it’s a core platform vulnerability, it could potentially impact a significant number of Magento stores. 

It emphasizes the importance of collaboration between security researchers, e-commerce platforms, and store owners. Security researchers play a vital role in identifying and disclosing vulnerabilities, allowing e-commerce platforms to issue timely patches. 

Store owners must prioritize applying these updates to minimize the window of opportunity for attackers.  By working together, all stakeholders can contribute to creating a more secure e-commerce ecosystem for both consumers and businesses. 

Malwarebytes asserts that the malicious skimmer implements its malicious activities by utilizing a network of compromised domains in order to carry out its activities.

These domains, including codecraft[.]shop, codemingle[.]shop, datawiz[.]shop, deslgnpro[.]shop, happywave[.]shop, luckipath[.]shop, pixelsmith[.]shop, salesguru[.]online, statlstic[.]shop, statmaster[.]shop, trendset[.]website, vodog[.]shop, artvislon[.]shop, statistall[.]com, and analytlx[.]shop, serve as a gateway for the skimmer to infiltrate systems, steal sensitive data, and potentially disrupt operations.

Also Read:

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version