Magecart threat actors used the same skimmer against two web-based suppliers to try to steal users’ payment card information.The first attack occurred at 15:56:42 GMT on 10 May when bad actors injected the skimmer into the bottom of a script used by enterprise content management system CloudCMS. This malicious action targeted version 1.5.23 of the script, which limited the scope of this attack. According to RiskIQ, version 1.5.23 affects just 20 percent of sites using CloudCMS.Even then, RiskIQ observed that only a few hundred websites were using CloudCMS scripts at the time of detection. Those using the affected version of the script were less numerous still.
The Magecart skimmer affecting Picreel. (Source: RiskIQ)RiskIQ believes that these two instances highlight how bad actors are increasingly becoming more efficient in their ability to launch supply chain attacks. This is concerning given the limited visibility which many organizations possess over their web-facing attack surface. As the firm explains in a blog post
:… [I]t takes less time than ever for consumers to see their data stolen, seemingly out of nowhe ..
Support the originator by clicking the read the rest link below.