Experts from Malwarebytes have discovered a new Magecart attack that compromised a website collecting donations for the victims of the Australia
Crooks planted a malicious script on the website that was designed to steal the payment information of the donors and send them to a domain under the control of the attackers.
The software skimmer named ATMZOW was planted in the checkout page and is executed when visitors of the site adds an item to their cart.
Stolen credit card data are sent to the
“Malwarebytes’ Jérôme Segura has told
The malicious domain used by the attackers was shu
Malwarebytes attempted to contact the owner of the website without success.
Unfortunately, many other e-commerce sites were compromised with the ATMZOW skimmer. Querying the
Two distinct MageCart groups have compromised multiple European websites for the Perricone MD anti-aging skin-care brand with the intent of stealing customer payment card info.
(SecurityAffairs – MageCart attack, hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.