Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

What's Hot

OpenAI Is Asking Contractors to Upload Work From Past Jobs to Evaluate the Performance of AI Agents

January 15, 2026

CES showed me why Chinese tech companies feel so optimistic

January 15, 2026

Partner update: HELTUN removed from Works with Home Assistant

January 15, 2026
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
Cyber Security

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

MichaBy MichaJanuary 15, 2026No Comments7 Mins Read
Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages


In the ever-evolving landscape of digital threats, a sophisticated web skimming campaign has been actively targeting major payment networks since January 2022, exposing countless e-commerce transactions to severe risk. This detailed analysis dives deep into the mechanics of this persistent threat, revealing how cybercriminals compromise legitimate websites, evade detection, and pilfer sensitive user data. Understanding these advanced web skimming techniques is crucial for bolstering your e-commerce security and protecting financial integrity in a world riddled with Magecart attacks. Read on to discover the intricate methods employed by attackers and essential strategies for safeguarding your digital presence.


The Persistent Threat of Web Skimming and Magecart Attacks

Digital payment systems, while convenient, have become prime targets for cybercriminals. Web skimming, also widely known as Magecart, refers to a category of client-side attacks where malicious actors inject harmful JavaScript code into legitimate e-commerce sites and payment portals. This code stealthily harvests sensitive credit card information and other personal data as unsuspecting users proceed through checkout pages. While the term "Magecart" initially referred to a coalition of cybercriminal groups specifically targeting Magento e-commerce platforms, it has since evolved to encompass any digital skimming operation, irrespective of the underlying technology.

The campaign unearthed by cybersecurity researchers at Silent Push highlights the pervasive and adaptable nature of these threats. Active since early 2022, it meticulously targets clients of major payment networks including American Express, Diners Club, Discover, JCB Co., Ltd., Mastercard, and UnionPay, indicating a broad scope and high-value targets.

Unpacking a Sophisticated Web Skimming Campaign

Origins and Obfuscated Payloads

The discovery of this campaign stemmed from the analysis of a suspicious domain, cdn-cookie[.]com, which was linked to a bulletproof hosting provider (Stark Industries/PQ.Hosting, now rebranded as THE[.]Hosting and operating under WorkTitans B.V. as a sanctions evasion measure). This domain serves as the distribution point for highly obfuscated JavaScript payloads, typically named "recorder.js" or "tab-gtm.js." These scripts are designed to be loaded by compromised web shops, acting as the digital skimmers that facilitate credit card theft. The obfuscation is a critical technique used by attackers to make the malicious code difficult to read, analyze, and detect by automated security tools and human analysts alike.

Advanced Evasion Tactics

One of the most striking aspects of this particular web skimming campaign is its advanced suite of detection evasion features, demonstrating an in-depth understanding of web environments.

  1. WordPress Admin Detection: The skimmer actively scans the Document Object Model (DOM) tree for an element named "wpadminbar." This specific element is indicative of a logged-in administrator or user with appropriate permissions viewing a WordPress website. If "wpadminbar" is present, the skimmer initiates a self-destruct sequence, removing its own presence from the web page. This ingenious trick ensures that site administrators, who are most likely to detect anomalies, remain unaware of the malicious activity. The skimmer attempts to execute every time the page’s DOM is modified – a standard event during user interaction – ensuring it’s ready to strike when an unsuspecting customer arrives, but retracts when an admin is present.

  2. Stripe Payment Form Manipulation: The skimmer also targets specific payment gateways, demonstrating its tailored approach. It checks if Stripe has been selected as a payment option. If so, it looks for an element called "wc_cart_hash" in the browser’s localStorage. This flag is created and set to "true" by the skimmer itself to indicate that a victim has already been successfully skimmed, preventing duplicate attacks on the same user.
    Critically, if this flag is absent, the skimmer renders a fake Stripe payment form, seamlessly replacing the legitimate one through user interface manipulations. Victims are tricked into entering their credit card numbers, expiration dates, and Card Verification Value (CVC) numbers into this fraudulent form. When the victim submits the fake form, the payment page displays an error, making it appear as if they simply entered their payment details incorrectly. This cunning deception allows the attackers to harvest data without raising immediate suspicion about a security breach.

Data Exfiltration and Cover-Up

The stolen data extends beyond just payment details. It includes names, phone numbers, email addresses, and shipping addresses, painting a complete picture of the victim for potential identity theft. This harvested information is then exfiltrated via an HTTP POST request to another attacker-controlled server, lasorie[.]com.

Once the data transmission is complete, the skimmer meticulously erases its traces from the checkout page. It removes the fake payment form, restoring the legitimate Stripe input form, and then sets the "wc_cart_hash" to "true." This final step prevents the skimmer from executing a second time on the same victim, a strategy to minimize detection and maximize efficiency across a broader victim pool. This level of operational sophistication underscores the advanced knowledge attackers possess regarding WordPress internals and modern web application security.

Fortifying Your E-commerce Security Against Client-Side Attacks

Protecting against such intricate Magecart attacks requires a multi-layered approach to cyber security. For businesses, proactive measures are paramount:

  • Client-Side Security Solutions: Implement security solutions that continuously monitor client-side scripts for integrity and unauthorized modifications. These tools can detect suspicious DOM manipulations and script injections in real-time.
  • Content Security Policies (CSPs): A robust CSP can significantly restrict which scripts are allowed to execute on your website and from which domains, effectively blocking unauthorized script injection and data exfiltration attempts.
  • Regular Security Audits & Penetration Testing: Consistently audit your website for vulnerabilities, especially in third-party integrations and payment gateways. Penetration tests can simulate attacks to uncover weaknesses before criminals do.
  • Supply Chain Security: Be vigilant about the security of third-party scripts and services you integrate (e.g., analytics, marketing, chat widgets). A compromise in any of these can lead to a client-side attack on your site.
  • Web Application Firewalls (WAFs): While not a silver bullet for client-side attacks, a WAF can help filter malicious traffic and block known attack patterns, acting as a crucial first line of defense.

Unique Tip: Consider implementing Subresource Integrity (SRI) for all third-party scripts loaded via <script> or <link> tags. SRI ensures that the files your browser fetches haven’t been tampered with by verifying a cryptographic hash. If the hash doesn’t match, the browser will refuse to execute the script, effectively neutralizing a common vector for web skimming.


FAQ

Question 1: What exactly is web skimming or a Magecart attack?
Answer 1: Web skimming, often referred to as Magecart, is a type of cyberattack where malicious code, typically JavaScript, is covertly injected into legitimate e-commerce websites. This code then intercepts and steals sensitive customer payment information (like credit card numbers, expiry dates, CVCs) and personal data (names, addresses, emails) directly from the user’s browser during checkout. It’s a client-side attack because the compromise occurs on the user’s browser rather than directly on the server.

Question 2: How can e-commerce businesses proactively protect themselves from these threats?
Answer 2: Businesses must adopt a comprehensive cyber security strategy. Key measures include:

  • Implementing Strong Content Security Policies (CSPs): This restricts resources (like scripts) that a browser is allowed to load or execute.
  • Regularly Auditing Third-Party Scripts: Any script from a third party (analytics, ads, widgets) is a potential vulnerability. Monitor their integrity and use Subresource Integrity (SRI).
  • Client-Side Security Monitoring Tools: Solutions that continuously scan and alert on unauthorized DOM changes or script injections are vital.
  • Maintaining Software Updates: Keep all e-commerce platforms, plugins, and server software updated to patch known vulnerabilities.
  • Employee Training: Educate staff on phishing and social engineering tactics that could lead to initial compromises.

Question 3: As a consumer, how can I protect myself from credit card skimming while shopping online?
Answer 3: While businesses hold primary responsibility, consumers can take steps:

  • Use Reputable Retailers: Stick to well-known, trusted e-commerce sites.
  • Look for HTTPS: Always check for "https://" in the URL and a padlock icon, indicating an encrypted connection.
  • Monitor Bank Statements: Regularly review credit card and bank statements for suspicious or unauthorized transactions. Report any anomalies immediately.
  • Use Virtual Card Numbers: Some banks and payment services offer virtual card numbers that can be used for single transactions or set with spending limits, adding an extra layer of protection.
  • Be Wary of Errors: If a payment page suddenly shows an unexpected error message after you enter details, be cautious. Double-check the URL and consider contacting the merchant directly before re-entering information.



Read the original article

0 Like this
campaign Cards Checkout credit LongRunning Online pages Skimming Steals Web
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleJoining the Home Assistant Podcast to Talk About PokyPow
Next Article Partner update: HELTUN removed from Works with Home Assistant

Related Posts

Cyber Security

The Top Cybersecurity Predictions For 2026

January 7, 2026
Cyber Security

SoundCloud confirms breach after member data stolen, VPN access disrupted

December 22, 2025
Cyber Security

Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT

December 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.