Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cybercriminals exploit Oneror event with image tags to deploy payment skimmers
Identity

Cybercriminals exploit Oneror event with image tags to deploy payment skimmers

userBy userFebruary 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 18, 2025Ravi LakshmananMalware/Website Hacking

Expand payment skimmer

Cybersecurity researchers have been observed targeting e-commerce sites running Magento by disguising malicious content within image tags in HTML code to stay under the radar Flagging malware campaigns that steal credit cards.

Magecart is the name given to malware that can steal sensitive payment information from online shopping sites. Attacks are known to employ a wide range of techniques, both on the client and server side, to compromise websites and deploy credit card skimmers to promote theft.

Typically, such malware is triggered or loaded only when a user visits the checkout page and enters credit card details.

The term Magecart is a reference to the original targets of these cybercrime groups, a Magento platform that provides check-out and shopping cart capabilities for online retailers. Over the years, such campaigns have adapted tactics by hiding malicious code through encoding and obfuscation within seemingly harmless sources, such as fake images, audio files, favicons, and even 404 error pages. Ta.

Cybersecurity

“In this case, malware affecting clients follows the same goal. It remains hidden,” said Suuri researcher Kayleigh Martin. “This is done by disguising malicious content inside. Tags and oversights become easier. ”

“That’s common Tags containing long strings, especially when referring to image file paths or Base64 encoded images, or additional attributes such as height or width. ”

The only difference is In this case, the tag acts as a decoy containing base64 encoded content pointing to the JavaScript code that is activated when an Oneror event is detected. This makes the attack even more despicable as the browser essentially trusts the Onera feature.

“If an image loads fail, the OnError function is triggered to display a broken image icon instead of the browser,” says Martin. “However, in this regard, the Oneror event is hijacked to run JavaScript as well as handling errors.”

Furthermore, this attack offers additional benefits to threat actors. HTML elements are generally considered harmless. The malware checks if the user is on the checkout page and waits for the unsuspecting user to click on the submit button and then click on the Sifon-sensitive payment information entered on the external server.

Expand payment skimmer

The script is designed to dynamically insert malicious forms with three fields, card number, expiration date and CVV, and is intended to extend it to a welfare[.]com.

“Attackers achieve two impressive goals with this malicious script. By encoding malicious scripts, by avoiding simple detection by security scanners, Tags and end users should not notice any unusual changes when malicious forms are inserted.

“The targets of attackers targeting platforms such as Magento, Woocommerce, Prestashop remain as undetectable as possible, and the malware injected into a site is more complicated than the portion of malware that affects other sites. .”

Cybersecurity

The development was based on a website security company detailing incidents that include WordPress sites that leverage Mu-Plugin (or required plugins) directories to embed backdoors and stealthly execute malicious PHP code. is.

“Unlike regular plugins, the required plugins are automatically loaded for all page loads without requiring activation or appearing in the standard plugin list,” says Puja Srivastava He said.

“Attackers will leverage this directory to maintain persistence and avoid detection because files placed here are automatically executed and are not easily disabled from the WordPress admin panel.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleElon Musk’s Xai releases its latest flagship model, the Grok 3
Next Article Schools confront the horrors of ice attacks after Trump’s immigration changes
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.