Skip to content

Unseen Magecart Assault Bowls Over Websites with Malicious JavaScript and Data Theft from Payment Information

E-commerce websites suffer from Magecart-style attacks, where malicious JavaScript is clandestinely inserted. This script, hidden for evasion, targets checkout pages to pilfer sensitive information such as payment data, exploiting security vulnerabilities in the process.

Magecart cybercriminals execute a fresh data theft attack, this time employing malicious JavaScript...
Magecart cybercriminals execute a fresh data theft attack, this time employing malicious JavaScript to swipe sensitive payment information

Unseen Magecart Assault Bowls Over Websites with Malicious JavaScript and Data Theft from Payment Information

In the digital landscape of mid-September 2025, a sophisticated Magecart-style attack campaign emerged, targeting e-commerce websites with the intent of harvesting sensitive payment information. This stealthy operation was orchestrated by a cybercriminal group known as Magecart.

The attacks, characterised by the deployment of malicious JavaScript, were hosted on attacker-controlled domains such as [redacted_1], [redacted_2], [redacted_3], and [redacted_4]. Cybersecurity researcher, Himanshu Anand, noted the malware's ability to leverage passive DNS and infrastructure fingerprinting to expand its operational reach.

The malware used in this campaign has been reused across several campaigns, with the malware logic replicated under different domain names. The injected script blends into legitimate payment workflows, hooking into form fields and event listeners to silently exfiltrate payment data.

More than a dozen active domains were revealed, some masquerading as legitimate analytics or utility services. Researcher Himanshu Anand mapped out a cluster of related domains linked to the attacker infrastructure, revealing that the attackers reinforce this infection pathway with persistent infrastructure, recycling domain patterns over time.

The skimmer script is injected automatically via JavaScript. The initial code observed in this campaign was heavily obfuscated to evade detection by security scanners and to frustrate analysis by incident responders.

The core data exfiltration logic ensures only valid, non-test credentials are transmitted, maximising the value of stolen data. The script establishes event hooks on payment input fields like credit card numbers and billing addresses. When triggered, the script collects stolen credentials and dispatches them to a remote server using XMLHttpRequest and FormData objects.

The malware's infrastructure is primarily hosted on IP address 45.61.136.141. As the digital world continues to evolve, it is crucial for e-commerce businesses to stay vigilant and implement robust security measures to protect their customers' sensitive data.

Read also:

Latest