The new exploit builds a fake frame around legitimate portions of an online commerce website.

Dark Reading Staff, Dark Reading

May 23, 2019

1 Min Read

A new strain of software designed to steal financial information from retail websites has surfaced,  demonstrating criminals' ability to adapt and improve their tools in the face of improved security measures.

The software, discovered by researcher Jérôme Segura at Malwarebytes, takes advantage of the popular retail practice of using a third-party credit card payment organization to facilitate credit card use. In this case, the software targets companies using Magento as their financial processing service provider. The malicious software inserts an iframe around the display code that would send the customer to Magento to finalize a purchase — an iframe that requests and captures the customer payment card info far earlier than it would be requested in a legitimate transaction.

This new attack is similar to an earlier overlay code tactic used by Magecart. It allows the purchase to proceed, minimizing the speed with which it might be found, but will exfiltrate customer payment information in the process. The only real clue for those who don't have the checkout page layout memorized is the process by which payment information is requested twice — which should alert all consumers that something is amiss.

Read more here.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights