Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Lisa Mission changes your understanding of gravitational waves

US dismantles Danabot malware network and charges 16 for $50 million global cybercrime operation

EU membership, seizing Russian money needed to rebuild Ukraine: Analysts | News of the Russian-Ukraine War

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Cybercriminals exploit Oneror event with image tags to deploy payment skimmers
Identity

Cybercriminals exploit Oneror event with image tags to deploy payment skimmers

userBy userFebruary 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 18, 2025Ravi LakshmananMalware/Website Hacking

Expand payment skimmer

Cybersecurity researchers have been observed targeting e-commerce sites running Magento by disguising malicious content within image tags in HTML code to stay under the radar Flagging malware campaigns that steal credit cards.

Magecart is the name given to malware that can steal sensitive payment information from online shopping sites. Attacks are known to employ a wide range of techniques, both on the client and server side, to compromise websites and deploy credit card skimmers to promote theft.

Typically, such malware is triggered or loaded only when a user visits the checkout page and enters credit card details.

The term Magecart is a reference to the original targets of these cybercrime groups, a Magento platform that provides check-out and shopping cart capabilities for online retailers. Over the years, such campaigns have adapted tactics by hiding malicious code through encoding and obfuscation within seemingly harmless sources, such as fake images, audio files, favicons, and even 404 error pages. Ta.

Cybersecurity

“In this case, malware affecting clients follows the same goal. It remains hidden,” said Suuri researcher Kayleigh Martin. “This is done by disguising malicious content inside. Tags and oversights become easier. ”

“That’s common Tags containing long strings, especially when referring to image file paths or Base64 encoded images, or additional attributes such as height or width. ”

The only difference is In this case, the tag acts as a decoy containing base64 encoded content pointing to the JavaScript code that is activated when an Oneror event is detected. This makes the attack even more despicable as the browser essentially trusts the Onera feature.

“If an image loads fail, the OnError function is triggered to display a broken image icon instead of the browser,” says Martin. “However, in this regard, the Oneror event is hijacked to run JavaScript as well as handling errors.”

Furthermore, this attack offers additional benefits to threat actors. HTML elements are generally considered harmless. The malware checks if the user is on the checkout page and waits for the unsuspecting user to click on the submit button and then click on the Sifon-sensitive payment information entered on the external server.

Expand payment skimmer

The script is designed to dynamically insert malicious forms with three fields, card number, expiration date and CVV, and is intended to extend it to a welfare[.]com.

“Attackers achieve two impressive goals with this malicious script. By encoding malicious scripts, by avoiding simple detection by security scanners, Tags and end users should not notice any unusual changes when malicious forms are inserted.

“The targets of attackers targeting platforms such as Magento, Woocommerce, Prestashop remain as undetectable as possible, and the malware injected into a site is more complicated than the portion of malware that affects other sites. .”

Cybersecurity

The development was based on a website security company detailing incidents that include WordPress sites that leverage Mu-Plugin (or required plugins) directories to embed backdoors and stealthly execute malicious PHP code. is.

“Unlike regular plugins, the required plugins are automatically loaded for all page loads without requiring activation or appearing in the standard plugin list,” says Puja Srivastava He said.

“Attackers will leverage this directory to maintain persistence and avoid detection because files placed here are automatically executed and are not easily disabled from the WordPress admin panel.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleElon Musk’s Xai releases its latest flagship model, the Grok 3
Next Article Schools confront the horrors of ice attacks after Trump’s immigration changes
user
  • Website

Related Posts

US dismantles Danabot malware network and charges 16 for $50 million global cybercrime operation

May 23, 2025

A vulnerability in the Gitlab duo allowed attackers to hijack AI responses with hidden prompts

May 23, 2025

Chinese hackers exploit Trimble CityWorks flaws to infiltrate US government networks

May 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Lisa Mission changes your understanding of gravitational waves

US dismantles Danabot malware network and charges 16 for $50 million global cybercrime operation

EU membership, seizing Russian money needed to rebuild Ukraine: Analysts | News of the Russian-Ukraine War

DiffusedRive raises $3.5 million to solve the biggest challenges of physical AI: high quality training data

Trending Posts

EU membership, seizing Russian money needed to rebuild Ukraine: Analysts | News of the Russian-Ukraine War

May 23, 2025

Do you think India, Pakistan and Iran are all pleading? Taliban | Taliban News

May 23, 2025

Russia-Ukraine War: List of Major Events, Day 1,184 | News of the Russian-Ukraine War

May 23, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

DiffusedRive raises $3.5 million to solve the biggest challenges of physical AI: high quality training data

Top Startup and Tech Funding News – May 22, 2025

Apple, who will launch smart glasses in 2026 as part of API push, drops plans for camera-equipped smartwatch

Psy develops the first unreliable bridge from Dogecoin to Solana

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.