Hackers use pixel-large SVG trick to hide credit card stealer
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求是直接写文章描述,不需要特定的开头。 首先,我仔细阅读了用户提供的文章内容。文章主要讲的是一个针对使用Magento平台的在线商店的网络攻击活动。攻击者利用了PolyShell漏洞,植入了一个很小的SVG图像来窃取信用卡信息。 接下来,我需要提取关键信息:攻击影响了近100家商店,使用了像素级的SVG图像隐藏恶意代码,当用户点击结账按钮时会显示一个伪造的结账页面,窃取支付数据。此外,Sansec公司发现了这一活动,并给出了防护建议。Adobe尚未发布修复补丁。 然后,我要将这些信息浓缩到100字以内。要注意用词简洁,涵盖主要事件、影响范围、技术手段以及后果。 最后,检查字数是否符合要求,并确保内容准确无误。 </think> 网络攻击者利用PolyShell漏洞针对近100家使用Magento平台的在线商店植入恶意代码,隐藏于像素级SVG图像中。攻击通过伪造结账页面窃取信用卡信息。研究人员建议商家检查隐藏SVG标签和异常数据传输,并升级至最新版本以应对威胁。 2026-4-8 22:45:15 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Hackers use pixel-large SVG trick to hide credit card stealer

A massive campaign impacting nearly 100 online stores using the Magento e-commerce platform hides credit card-stealing code in a pixel-sized Scalable Vector Graphics (SVG) image.

When clicking the checkout button, the victim is shown a convincing overlay that can validate card details and billing data.

The campaign was discovered by eCommerce security company Sansec, whose researchers believe that the attacker likely gained access by exploiting the PolyShell vulnerability disclosed in mid-March.

Wiz

PolyShell impacts all Magento Open Source and Adobe Commerce stable version 2 installations, allowing unauthenticated code execution and account takeover.

Sansec warned that more than half of all vulnerable stores were targeted in PolyShell attacks, which in some cases deployed payment card skimmers using WebRTC for stealthy data exfiltration.

In the latest campaign, the researchers found that the malware is injected as a 1x1-pixel SVG element with an ‘onload’ handler into the target website’s HTML.

“The onload handler contains the entire skimmer payload, base64-encoded inside an atob() call and executed via setTimeout,” Sansec explains.

“This technique avoids creating external script references that security scanners typically flag. The entire malware lives inline, encoded as a single string attribute.”

When unsuspecting buyers click checkout on compromised stores, a malicious script intercepts the click and displays a fake “Secure Checkout” overlay that includes card details fields and a billing form.

Payment data submitted on this page is validated in real time using the Luhn verification and exfiltrated to the attacker in an XOR-encrypted, base64-obfuscated JSON format.

Decoded payload
Decoded payload
Source: Sansec

Sansec identified six exfiltration domains, all hosted at IncogNet LLC (AS40663) in the Netherlands, and each getting data from 10 to 15 confirmed victims.

To protect against this campaign, Sansec recommends the following:

  • Look for hidden SVG tags with an onload attribute using atob() and remove them from your site files
  • Check if the _mgx_cv key exists in browser localStorage, as this indicates payment data may have been stolen
  • Monitor and block requests to /fb_metrics.php or any unfamiliar analytics-like domains
  • Block all traffic to the IP address 23.137.249.67 and associated domains

As of writing, Adobe has still not released a security update to address the PolyShell flaw in production versions of Magento. The vendor has only made a fix available in the pre-release version 2.4.9-alpha3+.

Also, Adobe has not responded to our repeated requests for a comment on the topic.

Website owners/admins are advised to apply all available mitigations and, if possible, upgrade Magento to the latest beta release.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-use-pixel-large-svg-trick-to-hide-credit-card-stealer/
如有侵权请联系:admin#unsafe.sh