Magecart web skimming group targets public hotspots and mobile users

Magecart web skimming group targets public hotspots and mobile users

One of the web skimming groups that operate under the Magecart umbrella has been testing the injection of payment card stealing code into websites through commercial routers like those used in hotels and airports. The group has also targeted an open-source JavaScript library called Swiper that is used by mobile websites and apps.

[ Get inside the mind of a hacker, learn their motives and their malware. | Sign up for CSO newsletters! ]

Security researchers from IBM’s X-Force Incident Response and Intelligence Services team have found what appear to be test skimming scripts developed earlier this year by one of the most prolific of the dozen or so groups tracked by the security industry as Magecart. These groups have compromised thousands of websites to date and have injected malicious code designed to steal payment details into their checkout pages.

To read this article in full, please click here



Support the originator by clicking the read the rest link below.