FraudHIGH

Hackers Use Pixel-Large SVG Trick to Steal Credit Cards

Featured image for Hackers Use Pixel-Large SVG Trick to Steal Credit Cards
#Magento#credit card skimmer#PolyShell vulnerability#Sansec#e-commerce

Original Reporting

BCBleepingComputer·Bill Toulas

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🚨
🚨 SCAM PROFILECVE-2026-XXXXACTIVELY EXPLOITED
Scam TypeCredit Card Skimmer
Target DemographicOnline Shoppers
Attack ChannelE-Commerce Websites
Social Engineering TacticFake Checkout Overlay
Financial Loss
ScaleApproximately 100 stores
Geographic FocusGlobal
Red FlagsUnexpected checkout overlays
Law Enforcement Action
🎯

Basically, hackers hide bad code in tiny images to steal credit card information from online shoppers.

Quick Summary

Hackers are targeting online stores using Magento with a clever SVG trick to steal credit card data. Nearly 100 stores are affected, making it crucial for site owners to act quickly to protect customer information.

What Happened

A significant cybersecurity threat has emerged, impacting nearly 100 online stores that utilize the Magento e-commerce platform. Hackers are employing a clever trick by hiding credit card-stealing code within a 1x1 pixel SVG image. This method allows them to bypass many security measures and effectively steal sensitive payment data from unsuspecting customers.

Who's Affected

The attack primarily targets online retailers using Magento, particularly those vulnerable to the PolyShell vulnerability. This flaw allows unauthorized code execution, making it easier for attackers to inject malicious scripts into the websites.

How the Attack Works

When victims click the checkout button on compromised sites, they are presented with a convincing fake overlay labeled “Secure Checkout.” This overlay collects credit card information and billing data. The malicious code, embedded in the SVG image, is executed through an onload handler. This technique prevents detection by security scanners, as the malware is encoded directly within the site's HTML.

Data Exfiltration

The stolen payment data is validated in real-time using the Luhn algorithm and is then sent to the attackers in a base64-obfuscated JSON format. The researchers from Sansec identified multiple exfiltration domains linked to this campaign, indicating a well-organized effort to siphon off sensitive information from multiple victims.

What You Should Do

To protect against this type of attack, website owners should take the following steps:

  • Inspect your site for hidden SVG tags with an onload attribute that uses atob() and remove them if found.
  • Check localStorage for the _mgx_cv key, which may indicate stolen payment data.
  • Monitor and block requests to suspicious domains like /fb_metrics.php.
  • Block traffic to the IP address 23.137.249.67 and any associated domains.

As of now, Adobe has not released a patch for the PolyShell vulnerability in production versions of Magento, leaving many stores at risk. It is crucial for site administrators to apply all available mitigations and consider upgrading to the latest beta release to safeguard against these attacks.

🔍 How to Check If You're Affected

  1. 1.Search for SVG tags with an onload attribute in your website's code.
  2. 2.Check localStorage for the presence of the _mgx_cv key.
  3. 3.Monitor outgoing requests for suspicious domains related to payment processing.
  4. 4.Block known malicious IP addresses associated with the attack.

🏢 Impacted Sectors

RetailTechnology

Pro Insight

🔒 Pro insight: This attack highlights the critical need for robust input validation and monitoring of third-party scripts in e-commerce environments.

Sources

Original Report

BCBleepingComputer· Bill Toulas
Read Original

Related Pings

HIGHFraud

FBI Reports Cybercrime Losses Near $21 Billion in 2025

The FBI revealed that cybercrime losses reached nearly $21 billion in 2025, with investment scams leading the way. This alarming rise underscores the urgent need for awareness and protection against fraud. Stay informed to safeguard your assets!

SecurityWeek·
HIGHFraud

Fraud Rockets Higher in Mobile-First Latin America

Fraud is surging in mobile-first Latin America as cyber-fraudsters exploit vulnerabilities. Financial institutions struggle to keep pace, putting users at risk. Awareness is key to protection.

Dark Reading·
HIGHFraud

Timeshare Owners - Beware of Cartel-Linked Scams

Authorities warn timeshare owners about cartel-linked scams. Criminals are exploiting vulnerable owners, leading to significant financial losses. Stay informed and protect yourself.

Malwarebytes Labs·
HIGHFraud

Indian Bank Alerts Users About Fake LPG Payment Scams

Indian Bank has warned users about a surge in fake LPG payment and KYC update scams. These scams are designed to steal banking information. Customers are urged to stay vigilant and verify communications through official channels.

Cyber Security News·
HIGHFraud

Threat Cluster Launches Extortion Campaign Using Social Engineering

A new extortion campaign led by the threat cluster UNC6783 is targeting business process outsourcers and help desk support teams using advanced social engineering tactics. Organizations must bolster their defenses against these evolving threats.

Cybersecurity Dive·
HIGHFraud

Weaponizing SaaS Notification Pipelines - New Phishing Tactics

Cisco Talos warns of a rise in phishing attacks using SaaS notifications. Attackers exploit platforms like GitHub and Jira to bypass security. This tactic poses a significant risk of credential theft.

Cisco Talos Intelligence·