The attack progression follows four distinct phases: initial back-end access using stolen credentials, web shell installation for persistent control, database poisoning through injection of obfuscated code, and finally, the credit card theft phase where customer payment information is captured and exfiltrated. The stolen data typically includes complete card details (number, expiration date, CVV), personal information (name, address, email), and often shipping details – essentially providing attackers with everything needed to conduct fraudulent transactions or engage in identity theft. A sophisticated Magecart attack campaign has been discovered targeting e-commerce platforms, employing heavily obfuscated JavaScript code to harvest sensitive payment information. These credentials provide the attackers with the privileged access needed to initiate their attack sequence, allowing them to bypass standard security measures and establish a foothold within the target infrastructure.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 22 Apr 2025 18:15:19 +0000