Malware & RansomwareHIGH

Magecart Hackers Hijack eStores Checkouts to Steal Card Data

Featured image for Magecart Hackers Hijack eStores Checkouts to Steal Card Data
CSCyber Security News
Magecarte-commercepayment card dataWebSocketfraud
🎯

Basically, hackers are stealing credit card info from online stores using fake checkout pages.

Quick Summary

A sophisticated Magecart campaign has been stealing payment card data from e-commerce sites for over two years. This operation affects banks and cardholders the most, leading to significant fraud losses. Security teams must enhance monitoring and defenses to combat this persistent threat.

What Happened

A sophisticated Magecart campaign has been operating for over two years, infecting e-commerce websites across at least 12 countries. This operation utilizes more than 100 malicious domains to steal payment card data in real time. Security researchers from ANY.RUN uncovered this large-scale operation, which has targeted numerous WooCommerce sites, particularly in regions like Spain and the United States. While e-commerce merchants are the initial targets, the financial fallout primarily affects banks and cardholders, leading to significant fraud losses.

The campaign has remained undetected for an extended period, highlighting the organized nature of this cybercrime. The attackers have employed a multi-stage infection chain designed to evade detection, ensuring that their malicious activities can continue even if individual components are taken down. This level of sophistication indicates a shift towards more persistent and infrastructure-driven operations.

How It Works

The attack begins with the compromise of a WooCommerce site, where attackers inject a small, obfuscated JavaScript loader into existing script files. This loader does not contain any card-stealing logic initially; instead, it retrieves a JSON configuration payload from external domains. This approach allows the attackers to dynamically load subsequent malicious stages while maintaining a low profile.

Once the checkout page is reached, the loader replaces the legitimate payment button with a fake one, effectively hijacking the payment interface. The attackers have meticulously crafted their scripts to mimic trusted payment service providers, such as Redsys, to enhance credibility. This high-fidelity impersonation is crucial for tricking unsuspecting users into entering their card details into the spoofed form.

Who's Being Targeted

Victims of this campaign include e-commerce merchants and their customers across various countries, including the United Kingdom, Denmark, France, and Spain. The operation's focus on the Redsys payment ecosystem in Spain has led to a significant concentration of attacks in that region. While merchants are the initial access points, the primary financial damage is inflicted on banks and cardholders, who face the brunt of fraud losses and eroded trust in digital payment systems.

The attackers have also expanded their reach by targeting mobile users. When accessing infected stores on mobile devices, users may encounter prompts offering discounts in exchange for downloading malicious apps. This tactic further broadens the attack surface and reinforces the campaign's organized nature.

How to Protect Yourself

For security teams, it’s essential to monitor outbound WebSocket connections from checkout pages, as these are often overlooked by conventional security measures. Implementing strict Content Security Policies (CSP) and conducting regular audits of third-party scripts can also mitigate risks. Additionally, JavaScript file integrity monitoring can help detect unauthorized changes to scripts.

Financial institutions should focus on proactive threat intelligence sharing and enhance fraud detection mechanisms for card-not-present transactions. By staying vigilant and adopting these defensive strategies, organizations can better protect themselves against this evolving class of payment threats. The Magecart campaign serves as a stark reminder of the persistent and adaptive nature of cybercrime in the digital age.

🔒 Pro insight: This Magecart campaign exemplifies the shift towards persistent, infrastructure-driven attacks, necessitating enhanced monitoring of WebSocket traffic in e-commerce environments.

Original article from

CSCyber Security News· Balaji N
Read Full Article

Related Pings

HIGHMalware & Ransomware

Linux Rootkit Detection - Importance of Behavioral Analysis

Rootkits in Linux systems are a growing threat, exposing the weaknesses of static detection methods. This article discusses how behavioral detection can enhance security. Discover techniques to better protect your systems against these stealthy attacks.

Elastic Security Labs·
HIGHMalware & Ransomware

Ransomware - New Cybercrime Service Promotes Data Monetization

A new cybercrime service is promoting the sale of data stolen from ransomware attacks. This could lead to more victims facing extortion. Experts are divided on its potential success.

SC Media·
HIGHMalware & Ransomware

CrystalRAT Malware - New Features Include Prankware and Theft

CrystalRAT malware is making waves with its remote access and data theft capabilities. Users of popular browsers and apps are at risk. Stay alert and avoid suspicious downloads to protect your data.

BleepingComputer·
HIGHMalware & Ransomware

Malware Campaign Uses WhatsApp to Deliver Malicious VBS Files

A new malware campaign is leveraging WhatsApp to deliver malicious VBS files via trusted cloud platforms. Organizations are at risk as attackers blend into normal operations, making detection challenging. Security experts recommend proactive measures to combat this evolving threat.

SC Media·
HIGHMalware & Ransomware

NoVoice Android Malware - Infected 2.3 Million Devices

A new Android malware named NoVoice has infected over 2.3 million devices via Google Play. This malware targets WhatsApp data, posing serious security risks. Users must take immediate action to secure their devices and data.

BleepingComputer·
HIGHMalware & Ransomware

CERT-UA Impersonation - Malware Campaign Targets 1 Million Emails

A new phishing campaign impersonating CERT-UA has spread AGEWHEEZE malware to over 1 million emails. This attack targeted various sectors, raising serious security alarms. Stay vigilant against such threats to protect your data.

The Hacker News·