Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Consumer watchdog warns about Google’s AI agent shopping protocols — Google says she’s wrong

Doctors think AI can play a role in medicine, but maybe not as chatbots

Long-running web skimming campaign steals credit cards from online checkout pages

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Long-running web skimming campaign steals credit cards from online checkout pages
Identity

Long-running web skimming campaign steals credit cards from online checkout pages

userBy userJanuary 13, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 13, 2026Ravi Lakshmanan Web security/data theft

Cybersecurity researchers have discovered a large-scale web skimming campaign that has been active since January 2022, targeting several major payment networks, including American Express, Diners Club, Discover, JCB Co., Ltd., Mastercard, and UnionPay.

“Enterprise organizations that are customers of these payment providers are likely to be most affected,” Silent Push said in a report released today.

Digital skimming attacks refer to a category of client-side attacks in which a malicious party compromises a legitimate e-commerce site or payment portal and injects malicious JavaScript code that can covertly collect credit card information and other personal information when an unsuspecting user attempts to make a payment on a checkout page.

These attacks fall under an umbrella term called Magecart. This refers to a coalition of cybercrime groups that initially used Magento software to target e-commerce sites, and later diversified into other products and platforms.

cyber security

Silent Push said it discovered the campaign after analyzing suspicious domains linked to currently licensed bulletproof hosting provider Stark Industries (and its parent company PQ.Hosting). Stark Industries has since rebranded to THE[.]The hosting, which is managed by Dutch company WorkTitans BV, is a sanctions avoidance measure.

The domain in question, cdn-cookie[.]com was found to host highly obfuscated JavaScript payloads (e.g. “recorder.js” or “tab-gtm.js”) that are loaded by web shops to facilitate credit card skimming.

Skimmers have the ability to evade detection by site administrators. Specifically, it checks the Document Object Model (DOM) tree for an element named “wpadminbar.” This is a reference to the toolbar that appears on a WordPress website when a logged in administrator or user with appropriate permissions is viewing the WordPress website.

If the “wpadminbar” element is present, the skimmer initiates a self-destruct sequence and removes its presence from the web page. The skimmer attempts to run every time the web page’s DOM changes. This is standard behavior that occurs when a user interacts with a page.

That’s not all. The skimmer also checks if Stripe is selected as a payment option. If selected, an element called “wc_cart_hash” exists in the browser’s localStorage. Create this element and set it to “true” to indicate that the victim has already been successfully skimmed.

Without this flag, skimmers render a fake Stripe payment form that replaces the legitimate form through user interface manipulation, tricking victims into entering their credit card number, expiration date, and card verification code (CVC) number.

“Because the victim entered their credit card information into the fake form instead of the actual Stripe payment form, the payment page displays an error because it was hidden by the skimmer when it was first entered,” Silent Push said. “This makes it appear as if the victim simply entered their payment information incorrectly.”

cyber security

The data stolen by skimmers goes beyond payment details, including names, phone numbers, email addresses, and shipping addresses. The information is ultimately extracted via an HTTP POST request to the server “lasorie”.[.]com”

Once the data submission is complete, the skimmer erases its traces from the checkout page, removes the created fake payment form, and restores the legitimate Stripe input form. It then sets “wc_cart_hash” to “true” to prevent the skimmer from running against the same victim again.

“This attacker has advanced knowledge of WordPress internals and has incorporated even lesser-known features into his attack chain,” Silent Push said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMalicious Chrome extension steals MEXC API keys by pretending to be a trading tool
Next Article Doctors think AI can play a role in medicine, but maybe not as chatbots
user
  • Website

Related Posts

Malicious Chrome extension steals MEXC API keys by pretending to be a trading tool

January 13, 2026

From MCP and tool access to shadow API key sprawl

January 13, 2026

New advanced Linux VoidLink malware targets cloud and container environments

January 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Consumer watchdog warns about Google’s AI agent shopping protocols — Google says she’s wrong

Doctors think AI can play a role in medicine, but maybe not as chatbots

Long-running web skimming campaign steals credit cards from online checkout pages

Malicious Chrome extension steals MEXC API keys by pretending to be a trading tool

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.