Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Georgetown scholars recall the “die process ock ha ha” of immigration prisons

Federal judges stop immigration authorities from revoking the legal status of international students

Top $Trump holder heads for an exclusive crypto dinner with the president

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Cybercriminals exploit Oneror event with image tags to deploy payment skimmers
Identity

Cybercriminals exploit Oneror event with image tags to deploy payment skimmers

userBy userFebruary 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 18, 2025Ravi LakshmananMalware/Website Hacking

Expand payment skimmer

Cybersecurity researchers have been observed targeting e-commerce sites running Magento by disguising malicious content within image tags in HTML code to stay under the radar Flagging malware campaigns that steal credit cards.

Magecart is the name given to malware that can steal sensitive payment information from online shopping sites. Attacks are known to employ a wide range of techniques, both on the client and server side, to compromise websites and deploy credit card skimmers to promote theft.

Typically, such malware is triggered or loaded only when a user visits the checkout page and enters credit card details.

The term Magecart is a reference to the original targets of these cybercrime groups, a Magento platform that provides check-out and shopping cart capabilities for online retailers. Over the years, such campaigns have adapted tactics by hiding malicious code through encoding and obfuscation within seemingly harmless sources, such as fake images, audio files, favicons, and even 404 error pages. Ta.

Cybersecurity

“In this case, malware affecting clients follows the same goal. It remains hidden,” said Suuri researcher Kayleigh Martin. “This is done by disguising malicious content inside. Tags and oversights become easier. ”

“That’s common Tags containing long strings, especially when referring to image file paths or Base64 encoded images, or additional attributes such as height or width. ”

The only difference is In this case, the tag acts as a decoy containing base64 encoded content pointing to the JavaScript code that is activated when an Oneror event is detected. This makes the attack even more despicable as the browser essentially trusts the Onera feature.

“If an image loads fail, the OnError function is triggered to display a broken image icon instead of the browser,” says Martin. “However, in this regard, the Oneror event is hijacked to run JavaScript as well as handling errors.”

Furthermore, this attack offers additional benefits to threat actors. HTML elements are generally considered harmless. The malware checks if the user is on the checkout page and waits for the unsuspecting user to click on the submit button and then click on the Sifon-sensitive payment information entered on the external server.

Expand payment skimmer

The script is designed to dynamically insert malicious forms with three fields, card number, expiration date and CVV, and is intended to extend it to a welfare[.]com.

“Attackers achieve two impressive goals with this malicious script. By encoding malicious scripts, by avoiding simple detection by security scanners, Tags and end users should not notice any unusual changes when malicious forms are inserted.

“The targets of attackers targeting platforms such as Magento, Woocommerce, Prestashop remain as undetectable as possible, and the malware injected into a site is more complicated than the portion of malware that affects other sites. .”

Cybersecurity

The development was based on a website security company detailing incidents that include WordPress sites that leverage Mu-Plugin (or required plugins) directories to embed backdoors and stealthly execute malicious PHP code. is.

“Unlike regular plugins, the required plugins are automatically loaded for all page loads without requiring activation or appearing in the standard plugin list,” says Puja Srivastava He said.

“Attackers will leverage this directory to maintain persistence and avoid detection because files placed here are automatically executed and are not easily disabled from the WordPress admin panel.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleElon Musk’s Xai releases its latest flagship model, the Grok 3
Next Article Schools confront the horrors of ice attacks after Trump’s immigration changes
user
  • Website

Related Posts

Chinese hackers exploit Trimble CityWorks flaws to infiltrate US government networks

May 22, 2025

Critical Windows Server 2025 DMSA vulnerability allows for active directory compromise

May 22, 2025

Chinese hackers exploit Ivanti EPMM bug in global enterprise network attacks

May 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Georgetown scholars recall the “die process ock ha ha” of immigration prisons

Federal judges stop immigration authorities from revoking the legal status of international students

Top $Trump holder heads for an exclusive crypto dinner with the president

The Trump administration prohibits Harvard University from registering international students

Trending Posts

Lebanon PM condemns wave of attacks on Lebanon in southern Israel | Israel attacks Lebanon News

May 22, 2025

Russia says it received a list of Ukrainian names for major prisoner swaps | News of the Russian-Ukraine War

May 22, 2025

Trump blocks Harvard’s ability to register international students Donald Trump News

May 22, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Psy develops the first unreliable bridge from Dogecoin to Solana

Founder of Amazon’s PillPack Launch General Medicine, a new startup tackling healthcare frustration in the US

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Bitcoin will surge beyond $111,000 from $74,508 a month ago amid new optimism

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.