Online shoppers at risk as Magecart skimming hits major payment networks
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。我得先仔细阅读文章内容,抓住关键点。 文章主要讲的是Magecart团伙攻击多个支付提供商,包括American Express、Diners Club、Discover和Mastercard。他们使用恶意JavaScript进行网络抓取,窃取支付数据。这个活动从2022年初开始,涉及多个域名,影响范围广。攻击者通过供应链漏洞植入脚本,商家需要保持警惕,更新系统和监控CMS。建议用户使用虚拟卡、开启交易提醒、使用强密码,并安装浏览器保护软件。 总结的时候要涵盖攻击目标、技术手段、活动时间、影响范围以及防范措施。控制在100字以内,所以得简洁明了。 可能的结构: Magecart团伙利用恶意JS攻击多个支付提供商,窃取数据;活动自2022年持续至今;商家需防范供应链漏洞;建议用户采取措施保护账户安全。 这样应该能全面覆盖主要内容,并且符合字数限制。 </think> Magecart团伙利用恶意JavaScript攻击多个支付提供商,窃取支付数据;该活动自2022年初持续至今,涉及广泛网络;商家需防范供应链漏洞;建议用户使用虚拟卡、开启交易提醒、使用强密码并安装浏览器保护软件以降低风险。 2026-1-14 12:3:45 Author: www.malwarebytes.com(查看原文) 阅读量:0 收藏

Researchers have been tracking a Magecart campaign that targets several major payment providers, including American Express, Diners Club, Discover, and Mastercard.

Magecart is an umbrella term for criminal groups that specialize in stealing payment data from online checkout pages using malicious JavaScript, a technique known as web skimming.

In the early days, Magecart started as a loose coalition of threat actors targeting Magento‑based web stores. Today, the name is used more broadly to describe web-skimming operations against many e‑commerce platforms. In these attacks, criminals inject JavaScript into legitimate checkout pages to capture card data and personal details as shoppers enter them.

The campaign described by the researchers has been active since early 2022. They found a vast network of domains related to a long-running credit card skimming operation with a wide reach.

“This campaign utilizes scripts targeting at least six major payment network providers: American Express, Diners Club, Discover (a subsidiary of Capital One), JCB Co., Ltd., Mastercard, and UnionPay. Enterprise organizations that are clients of these payment providers are the most likely to be impacted.”

Attackers typically plant web skimmers on e-commerce sites by exploiting vulnerabilities in supply chains, third-party scripts, or the sites themselves. This is why web shop owners need to stay vigilant by keeping systems up to date and monitoring their content management system (CMS).

Web skimmers usually hook into the checkout flow using JavaScript. They are designed to read form fields containing card numbers, expiry dates, card verification codes (CVC), and billing or shipping details, then send that data to the attackers.

To avoid detection, the JavaScript is heavily obfuscated to and may even trigger a self‑destruct routine to remove the skimmer from the page. This can cause investigations performed through an admin session to appear unsuspicious.

Besides other methods to stay hidden, the campaign uses bulletproof hosting for a stable environment. Bulletproof hosting refers to web hosting services designed to shield cybercriminals by deliberately ignoring abuse complaints, takedown requests, and law enforcement actions.

How to stay safe

Magecart campaigns affect three groups: customers, merchants, and payment providers. Because web skimmers operate inside the browser, they can bypass many traditional server‑side fraud controls.

While shoppers cannot fix compromised checkout pages themselves, they can reduce their exposure and improve their chances of spotting fraud early.

A few things you can protect against the risk of web skimmers:

  • Use virtual or single‑use cards for online purchases so any skimmed card number has a limited lifetime and spending scope.
  • Where possible, turn on transaction alerts (SMS, email, or app push) for card activity and review statements regularly to spot unsolicited charges quickly.
  • Use strong, unique passwords on bank and card portals so attackers cannot easily pivot from stolen card data to full account takeover.
  • Use a web protection solution to avoid connecting to malicious domains.

Pro tip: Malwarebytes Browser Guard is free and blocks known malicious sites and scripts.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/01/online-shoppers-at-risk-as-magecart-skimming-hits-major-payment-networks
如有侵权请联系:admin#unsafe.sh