Cybersecurity researchers have discovered that a new credit card theft malware has been implemented to bypass client-side detection on e-commerce sites running unsupported versions of Magento. The campaign has been attributed to Magecart Group, as it uses an infrastructure previously linked to the group and the new malware disguises itself as favicon easily to trick users.
The specialist at the security firm Malwarebytes Jerome Segura mentions that your computer detected this malware on a few sites, although this was enough to determine the existence of a pattern. In its report, Segura mentions that the latest version of Magento 1 runs on at least 53,000 e-commerce websites, after nearly 1 year of Adobe announcing that this release would be discontinued.
Magecart 12 threat actors were also singled out as responsible for a wave of attacks abusing another new and improved skimmer, called ‘Ant and Cockroach’ and impacting nearly 3,000 web domains. Among other campaigns, Magecart has been noted to run a malicious campaign using a fake Cloudflare library for the installation of cryptocurrency mining software.
Segura urged online retailers to keep their stores “updated and reinforced, not only to pass PCI standards but also to maintain the trust that shoppers place in them.” According to an analysis of Magento’s websites conducted by cybersecurity firm Foregenix in July 2020, a few days after the provider’s support was suspended, 79.6% of malware-infected domains were running Magento 1.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.