• My Account
  • Shop
  • Cart

Cyber Bunee

  • Home
  • News
    • artificial intelligence
    • cyber-security
    • hacking attacks
    • software dev
    • automation
    • certifications
    • Videos
      • Youtube Videos
    • Resources

    New Magecart Campaign: Multiple Cybercrime Groups Operating Simultaneously

    Uncovering a New Ongoing Magecart Campaign

    Tech experts specializing in cybersecurity have discovered a new web skimmer campaign that operates similarly to the infamous Magecart campaign. This particular campaign was specifically created to collect personally identifiable information (PII) and credit card data from e-commerce websites.

    The twist, however, is that this Magecart campaign goes further than the ones that came before it. The hijacked sites now double as “makeshift” command-and-control (C2) servers, allowing multiple cybercrime groups to conduct their operations simultaneously.

    Making Use of Multiple Cybercrime Groups

    The hackers behind this latest Magecart-style campaign have done something unprecedented. They’ve made it possible for multiple cybercrime groups to use their hijacked sites as C2 servers. The aim is to maintain their operations while avoiding detection by law enforcement agencies.

    So far, the groups that have used this infrastructure for their operations aren’t necessarily related. However, the fact that they have managed to use the same server infrastructure without compromising each other’s operations is a worrying indication of the campaign’s effectiveness.

    Stealing Personal and Financial Information

    The end goal of the new web skimmer campaign is simple yet highly lucrative. The hackers’ primary target is e-commerce websites, which are particularly vulnerable to attacks as they process large amounts of personal and financial information.

    By stealing this data, the hackers can carry out identity theft, create cloned cards, or sell the information on dark web marketplaces for a profit.

    The Bottom Line

    This Magecart-style web skimmer campaign is quite different from others that have been seen before. Its use of hijacked sites as makeshift C2 servers is novel, and its success in hosting multiple cybercrime groups is particularly concerning. Companies that run e-commerce websites must remain vigilant and take all necessary measures to protect their customers’ personal and financial information. The risks of not doing so are far too high.

    Original Article:https://thehackernews.com/2023/06/magento-woocommerce-wordpress-and.html

    hacking 2023-06-05
    Facebook Twitter linkedin Pinterest WhatsAppt Telegram Email More
    Previous Article :

    And We’re Back!…

    Next Article :

    Tech Firm Mitigates Ransomware Attack: Tips for Protection

    Similiar

    “Bracing for the Cyber Onslaught: Understanding the Surge in Dual Ransomware Attacks”

    “Bracing for the Cyber Onslaught: Understanding the Surge in Dual Ransomware Attacks”

    “Iran’s OilRig Strikes Again: Unpacking the Menorah Malware Menace”

    “Iran’s OilRig Strikes Again: Unpacking the Menorah Malware Menace”

    “Understanding Exim Security Vulnerabilities: An In-depth Look into CVE-2023-42114”

    “Understanding Exim Security Vulnerabilities: An In-depth Look into CVE-2023-42114”

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    See Also...

    “Bracing for the Cyber Onslaught: Understanding the Surge in Dual Ransomware Attacks”

    “Bracing for the Cyber Onslaught: Understanding the Surge in Dual Ransomware Attacks”

    Double Trouble: FBI Warns of Spike in Dual Ransomware Attacks Main Points The FBI has ...

    Latest News

    And We’re Back!…
    news

    And We’re Back!…

    bunee 04 Jun 2023

    Tech Reviews

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age
    tech review

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age

    bunee 20 Jun 2023
    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks
    tech review

    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks

    bunee 20 Jun 2023
    The Importance of Technology Training for Government Employees
    tech review

    The Importance of Technology Training for Government Employees

    bunee 20 Jun 2023
    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users
    tech review

    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users

    bunee 20 Jun 2023
    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”
    tech review

    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”

    bunee 20 Jun 2023
    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”
    tech review

    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”

    bunee 20 Jun 2023
    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller
    tech review

    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller

    bunee 20 Jun 2023
    • Home
    • News
      • artificial intelligence
      • cyber-security
      • hacking attacks
      • software dev
      • automation
      • certifications
    • Videos
      • Youtube Videos
    • Resources

    Follow Us

    Popular Videos

    Newsletter

    Popular News

    • 1

      And We’re Back!…

    • 2

      New Magecart Campaign: Multiple Cybercrime Groups Operating Simultaneously

    • 3

      Major UK Organizations Suffer Data Breaches: Boots, British Airways, and the BBC Among Those Affected

    • 4

      Verizon Report: Human Error a Top Cause of Cybersecurity Incidents in 2019

    • 5

      Tech Firm Mitigates Ransomware Attack: Tips for Protection

    Fellow Sponsors

    Tags

    attacks break into cyber coinbase crypto hacking how to ransomware updates
    (▀̿Ĺ̯▀̿ ̿) Copyright , All Rights Reserved
    Website courtesy of Lucid Perspective