One of the Magecart cybercriminal groups is testing a new method for grabbing users’ credit card info: malicious skimming code that can be loaded into files used by L7 routers.
What is Magecart?
Magecart is an umbrella label for a growing number of cybercriminals groups that perform JavaScript-based credit card skimming attacks, usually by:
A novel approach
Researchers with the IBM X-Force Incident Response and Intelligence Services (IRIS) team have spotted and discovered 17 “test” files fed into VirusTotal, and believe that person is part or working for Magecart Group 5 (MG5), which mostly focuses on targeting third-party services used by e-commerce websites by injecting skimming code to JavaScript libraries they provide.
A thorough analysis of those files lead them to believe that the group is working on code that will a ..
Support the originator by clicking the read the rest link below.