Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
嗯,用户让我帮忙总结这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要内容。 文章讲的是网络犯罪分子通过Magecart攻击,利用JavaScript代码从支付页面窃取信用卡信息。他们攻击了多个支付网络,并且使用了复杂的隐蔽技术来逃避检测。 我得确保总结包括关键点:Magecart攻击、JavaScript代码、支付页面、信用卡信息、逃避检测的技术。同时,要简洁明了,不超过100字。 可能的结构是先说明攻击类型和目标,然后描述技术手段和影响。这样既全面又符合字数要求。 最后检查一下有没有遗漏的重要信息,比如攻击时间、受影响的机构等,但因为字数限制,可能需要简化。 </think> 网络犯罪分子利用 Magecart 攻击,在合法电商网站和支付门户中注入恶意 JavaScript 代码,窃取用户信用卡信息及其他个人信息。这些攻击通过隐蔽技术逃避检测,并利用 WordPress 等平台特性隐藏自身。 2026-1-13 17:30:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Web Security / Data Theft

Cybersecurity researchers have discovered a major web skimming campaign that has been active since January 2022, targeting several major payment networks like American Express, Diners Club, Discover, JCB Co., Ltd., Mastercard, and UnionPay.

"Enterprise organizations that are clients of these payment providers are the most likely to be impacted," Silent Push said in a report published today.

Digital skimming attacks refer to a category of client-side attacks in which bad actors compromise legitimate e-commerce sites and payment portals to inject malicious JavaScript code that's capable of stealthily harvesting credit card information and other personal information when unsuspecting users attempt to make a payment on checkout pages.

These attacks are classified under an umbrella term called Magecart, which initially referred to a coalition of cybercriminal groups that targeted e-commerce sites using the Magento software, before diversifying to other products and platforms.

Cybersecurity

Silent Push said it discovered the campaign after analyzing a suspicious domain linked to a now-sanctioned bulletproof hosting provider Stark Industries (and its parent company PQ.Hosting), which has since rebranded to THE[.]Hosting, under the control of the Dutch entity WorkTitans B.V., is a sanctions evasion measure.

The domain in question, cdn-cookie[.]com, has been found to host highly obfuscated JavaScript payloads (e.g., "recorder.js" or "tab-gtm.js") that are loaded by web shops to facilitate credit card skimming.

The skimmer comes with features to evade detection by site administrators. Specifically, it checks the Document Object Model (DOM) tree for an element named "wpadminbar," a reference to a toolbar that appears in WordPress websites when logged-in administrators or users with appropriate permissions are viewing the site.

In the event the "wpadminbar" element is present, the skimmer initiates a self-destruct sequence and removes its own presence from the web page. An attempt to execute the skimmer is made every time the web page's DOM is modified, a standard behavior that occurs when users interact with the page.

That's not all. The skimmer also checks to see if Stripe was selected as a payment option, and if so, there exists an element called "wc_cart_hash" in the browser's localStorage, which it creates and sets to "true" to indicate that the victim has already been successfully skimmed.

The absence of this flag causes the skimmer to render a fake Stripe payment form that replaces the legitimate form through user interface manipulations, thereby tricking the victims into entering their credit card numbers, along with the expiration dates and Card Verification Code (CVC) numbers.

"As the victim entered their credit card details into a fake form instead of the real Stripe payment form, which was initially hidden by the skimmer when they initially filled it out, the payment page will display an error," Silent Push said. "This makes it appear as if the victim had simply entered their payment details incorrectly."

Cybersecurity

The data stolen by the skimmer extends beyond payment details to include names, phone numbers, email addresses, and shipping addresses. The information is eventually exfiltrated by means of an HTTP POST request to the server "lasorie[.]com."

Once the data transmission is complete, the skimmer erases traces of itself from the checkout page, removing the fake payment form that was created and restoring the legitimate Stripe input form. It then sets "wc_cart_hash" to "true" to prevent the skimmer from being run a second time on the same victim.

"This attacker has advanced knowledge of WordPress's inner workings and integrates even lesser-known features into their attack chain," Silent Push said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/long-running-web-skimming-campaign.html
如有侵权请联系:admin#unsafe.sh