Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

ScreamedJungle Targets E-Commerce Sites

February 25, 2025
Reading Time: 2 mins read
in Alerts
MITRE Caldera Vulnerability Exposes Systems

A sophisticated cybercriminal campaign, identified as ScreamedJungle, has been uncovered, exploiting stolen browser fingerprints to bypass fraud detection systems and impersonate legitimate users. The threat actor behind this campaign has been targeting outdated Magento e-commerce platforms, particularly versions that have not received security updates since September 2022, such as Magento 2.3. Exploiting vulnerabilities like CVE-2024-34102 (CosmicSting) and CVE-2024-20720, the attackers inject malicious JavaScript scripts into compromised websites. These scripts collect unique digital identifiers, including data points such as screen resolution, graphics card details, and installed fonts, allowing cybercriminals to gather comprehensive browser fingerprints from unsuspecting visitors.

Browser fingerprinting has become a powerful technique used by both legitimate security systems and cybercriminals. This method collects hundreds of browser and device characteristics, and it is increasingly being exploited by attackers to bypass traditional fraud detection mechanisms. Cybersecurity researchers from Group-IB have discovered that ScreamedJungle uses browser fingerprinting to disguise automated attacks as legitimate user activity, allowing the attackers to bypass multi-factor authentication (MFA) and device reputation checks. The campaign has been particularly effective in impersonating real users, evading security systems meant to detect and prevent automated fraud.

The malicious JavaScript payload injected into compromised Magento sites activates specifically for desktop users. It collects over 50 parameters from victims’ browsers and sends this data to a domain controlled by the attackers. Once the information is gathered, it is stored in a private database tied to the Bablosoft FingerprintSwitcher module. Using PerfectCanvas technology, ScreamedJungle clones legitimate browser fingerprints, ensuring pixel-perfect replication of user data. By combining this fingerprinting technology with BrowserAutomationStudio (BAS), the attackers can automate credential-stuffing attacks while remaining undetected by fraud detection systems.

The impact of this campaign is widespread, with over 200,000 users exposed on just nine compromised Italian e-commerce sites. Since May 2024, it is estimated that millions of fingerprints have been harvested globally. Businesses are urged to patch their systems promptly, monitor for unauthorized script injections, and implement device-binding protocols to defend against these types of attacks. Users are also encouraged to adopt privacy-focused browsers, such as Brave or Tor, and use anti-fingerprint extensions to limit the effectiveness of tracking and mitigate the risk posed by these advanced cybercriminal tactics.

Reference:
  • ScreamedJungle Campaign Use Stolen Browser Fingerprints to Bypass Fraud Detection
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityFebruary 2025
ADVERTISEMENT

Related Posts

Open VSX Flaw Allowed Extension Hijacks

Open VSX Flaw Allowed Extension Hijacks

June 27, 2025
Open VSX Flaw Allowed Extension Hijacks

nOAuth Flaw Allows Easy Account Takeover

June 27, 2025
Open VSX Flaw Allowed Extension Hijacks

Unpatchable Flaw In Hundreds Of Printers

June 27, 2025
New Malware Uses Prompts To Trick AI Tools

Fake Job Offers Hide North Korean Malware

June 26, 2025
New Malware Uses Prompts To Trick AI Tools

New Malware Uses Prompts To Trick AI Tools

June 26, 2025
New Malware Uses Prompts To Trick AI Tools

New Zero Day Flaw Hits Citrix NetScaler

June 26, 2025

Latest Alerts

nOAuth Flaw Allows Easy Account Takeover

Unpatchable Flaw In Hundreds Of Printers

Open VSX Flaw Allowed Extension Hijacks

Fake Job Offers Hide North Korean Malware

New Malware Uses Prompts To Trick AI Tools

New Zero Day Flaw Hits Citrix NetScaler

Subscribe to our newsletter

    Latest Incidents

    Hawaiian Airlines Hit By Cyberattack

    Qilin Ransomware Gang Hacks Estes Freight

    Generali Customer Data Exposed In Hack

    Resupply DeFi Protocol Hacked For $9.6M

    Cyberattack Hits South Tyrol Emergency Ops

    UK’s Glasgow City Council Hit By Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial