Card Skimming Malware Found on Thousands of Magento-Based Sites

September 10, 2018 Published in: News Author: Vedran Bozicevic

A card skimming operation has compromised 7,339 Magento-based online stores, allowing the attackers to quietly slurp payment card info as it’s being entered by customers.

Flagged in early August by Peeter Marvet (in Estonian) and then by security researcher Willem de Groot these online shops were hit in the last six monts.

“The average recovery time is a few weeks, but at least 1,450 stores have hosted the MagentoCore.net parasite during the full past 6 months,” de Groot shared.

And the campaign continues: according to his scans, the attackers have been hijacking 50 to 60 new stores per day over the last two weeks.

The online shops are likely compromised in a variety of ways: through Magento security holes, compromised accounts (either via malware or brute-forcing), etc.

Once the attackers gain access to the control panel of an e-commerce site, they change the code of the site’s HTML template to include a call for a malicious script (mage.js) hosted on the attackers’ servers.

The script records customers’ keystrokes as they enter their card number, expiry date, security code and personally identifiable information (PII) and uploads the data to a server controlled by the attackers.

According to de Groot, among the victims of this operations are multi-million dollar, publicly traded companies and, of course, their customers.

If you’re running a Magento-based e-commerce operation, you would do well to check whether you’ve been hit as well.

Image Source

Read more: Help Net Security

Vedran Bozicevic

I am a digital marketer with several years of experience with various types of online marketing technologies and channels. Before joining GlobalDots, my experience included working as a content marketing manager for a software development company, and several others marketing positions where I worked on digital marketing strategies and channels.

Our Story

 

GlobalDots helps companies to evaluate, purchase, and integrate cloud services by acting as a neutral consultancy layer between vendors and customers with a keen focus on optimizing performance, workflows, and costs.

We're in the unique position to orchestrate full-stack, multi-vendor architectures such as multi-CDN, CDN+WAF+AWS, CDN+Mobile App optimization, dual-DNS, and other interesting setups.

Increase speed, availability and reliability of your website by learning from the experts in our FREE email course.

Learn everything you need to know about Bad Bot threats by downloading your FREE copy of Bad Bot Report 2018.

Find out the most important tips&tricks before selecting your next CDN provider in this FREE guide.

Find out all the specifics about web threats by downloading our FREE Field Guide to Modern Web Security.