Fake GIF Leveraged in Multi-Stage Reverse-Proxy Card Skimming Attack
A sophisticated multi-stage carding attack on a Magento eCommerce website has been uncovered. The malware used a fake gif image file, local browser sessionStorage data, and a malicious reverse-proxy server to steal credit card data, login details, cookies, and other sensitive information. The attack targeted an outdated Magento 1.9.2.4 installation, exploiting its lack of support and security vulnerabilities. The malware injected JavaScript code disguised as Bing tracking code and utilized a tampered payment file to create a user-specific attack. This advanced technique allowed the attackers to intercept and manipulate all website traffic while remaining undetected by victims and administrators.
Pulse ID: 680c5278fbbef40e36ef3f9f
Pulse Link: https://otx.alienvault.com/pulse/680c5278fbbef40e36ef3f9f
Pulse Author: AlienVault
Created: 2025-04-26 03:26:48
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cookies #CreditCard #CyberSecurity #InfoSec #Java #JavaScript #Magento #Malware #OTX #OpenThreatExchange #Proxy #RAT #RCE #bot #AlienVault