Magecart Campaign - Active Threat Targeting Ecommerce Sites

Significant risk — action recommended within 24-48 hours
Basically, hackers are using sneaky scripts to steal credit card info from online shoppers.
A Magecart campaign is stealthily targeting ecommerce sites with customized malware. This attack injects fake payment forms to steal sensitive card data. Stay vigilant and protect your online transactions.
What Happened
A Magecart campaign is currently targeting ecommerce websites, employing sophisticated techniques to inject malicious code. This code creates fake payment forms that capture sensitive payment information from unsuspecting users. By monitoring actual code execution in the browser, the attackers have managed to remain hidden from site owners.
How It Works
The attack begins with a simple script injection into the <head> section of the website. This script mimics legitimate code, making it difficult to detect. Once active, the malware:
- Injects a fake payment form styled to look like the original.
- Hooks into form inputs, capturing data as users fill it out.
- Exfiltrates stolen data to attacker-controlled servers through various methods, including a clever CSP bypass technique that redirects users while stealing their information.
Who's Being Targeted
This campaign specifically targets ecommerce platforms like WooCommerce, Magento, OpenCart, and PrestaShop. The malware customizes its payload based on the platform, enhancing its effectiveness and evasion capabilities.
Signs of Infection
Site owners may notice:
- Unusual redirects during payment submissions.
- Unexpected scripts loaded on checkout pages.
- Changes in telemetry or logs related to the domain styleoutsperee.com.
How to Protect Yourself
If you manage an ecommerce site, take immediate action:
- Review recent script changes on payment pages.
- Monitor logs for suspicious activity related to the attack domain.
- Investigate any unexpected redirects during the payment process.
- Check for unauthorized JavaScript that could access payment fields.
Ongoing Threat
This Magecart campaign is still active, and while some organizations have been notified, many remain at risk. By sharing these findings, we aim to help defenders identify and disrupt these attacks effectively. Continuous vigilance and monitoring are essential to protect sensitive data from these evolving threats.
🔍 How to Check If You're Affected
- 1.Check for unauthorized JavaScript on checkout pages.
- 2.Review server logs for requests to styleoutsperee.com.
- 3.Monitor for unexpected redirects during payment processes.
🗺️ MITRE ATT&CK Techniques
🔒 Pro insight: The adaptive nature of this Magecart attack highlights the need for robust client-side security measures in ecommerce environments.