To protect against such attacks, organizations should sanitize inputs by removing non-whitelisted attributes like onerror from HTML tags, monitor checkout pages by regularly inspecting the page source code for anomalies, and keep CMS platforms like Magento updated with the latest security patches. Security analysts at Sucuri detected that by embedding Base64-encoded malicious payloads within the tag’s attributes, hackers bypass conventional security measures and steal sensitive payment information during checkout processes. Cybercriminals have developed a sophisticated method to steal credit card information by embedding malicious scripts within <img> tags on e-commerce websites. Embedding malicious scripts within such tags allows attackers to avoid detection by antivirus and security scanners. Implementing web application firewalls can help detect and block suspicious activity, while enabling content security policies can restrict script execution to trusted sources. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. This technique, often associated with MageCart attacks, exploits the trustworthiness of image tags to evade detection while targeting platforms like Magento, WooCommerce, and PrestaShop.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 18 Feb 2025 13:45:14 +0000