Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Magecart Exploits 404 Pages

October 10, 2023
Reading Time: 2 mins read
in Alerts

A new Magecart card skimming campaign has been discovered, employing a unique method to steal credit card information from online retailers. This campaign targets Magento and WooCommerce sites, affecting some prominent players in the food and retail sectors.

Furthermore, the attackers utilize a novel technique by hijacking the 404 error pages of these websites to hide and execute their malicious code. This approach, not seen in previous Magecart campaigns, poses a significant challenge to webmasters and website security.

The Magecart actors make use of the default ‘404 Not Found’ error page to conceal and load their card-stealing code, making it difficult to detect. Akamai Security Intelligence Group, the researchers behind the discovery, consider this concealment technique highly innovative and unprecedented in Magecart campaigns. The attackers employ a skimmer loader that disguises itself as a Meta Pixel code snippet or hides within existing inline scripts on compromised checkout pages.

To execute their attack, the loader initiates a fetch request to a relative path named ‘icons,’ generating a “404 Not Found” error since the path doesn’t exist on the website. Upon closer examination, Akamai investigators discovered that the loader used regular expressions to search for a specific string in the HTML of the 404 page. This string led them to a concatenated base64-encoded string hidden in a comment, revealing the JavaScript skimmer present on all 404 pages.

The skimmer code creates a fake form for website visitors to enter sensitive information like credit card numbers, expiration dates, and security codes. After inputting this data, victims receive a fake “session timeout” error. The skimmer then encodes and sends all the stolen information to the attacker via an image request URL, effectively evading detection by appearing as a benign image fetch event.

This campaign underscores the evolving tactics of Magecart actors, making it increasingly challenging to detect and remove their malicious code from compromised websites.

Reference:
  • The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages
Tags: card skimmingCredit cardCyber AlertCyber Alerts 2023CybersecurityE-commerceMagecartMagentoOctober 2023VulnerabilitiesWebsiteWooCommerce
ADVERTISEMENT

Related Posts

DevOps Servers Hit By JINX0132 Crypto Mine

Fake FB Ban Fix Extension Steals Accounts

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

Actively Exploited Chrome V8 Flaw Patched

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

DevOps Servers Hit By JINX0132 Crypto Mine

June 3, 2025
Linux Core Dump Flaws Risk Password Leaks

Linux Core Dump Flaws Risk Password Leaks

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

Google Script Used In New Phishing Scams

June 2, 2025

Latest Alerts

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

Subscribe to our newsletter

    Latest Incidents

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial