#magecart

🦠Toxic Flange (Gurjeet)🔬⚱️🌚Toxic_Flange@infosec.exchange
2026-01-23

Oh goody, looks like #CanadaComputers in uh #Canada had #magecart style skimmer on their web checkout system.

It'll be months before they say or admit to anything i'm sure.

reddit.com/r/bapccanada/commen

#infosec

2026-01-18

📢 Keylogger sur la boutique d’employés d’une des 3 plus grandes banques US (200 000+ exposés)
📝 Source : Sansec Forensics Team (Threat Research), avis publié le 15 janvier 2026.
📖 cyberveille : cyberveille.ch/posts/2026-01-1
🌐 source : sansec.io/research/keylogger-m
#IOC #Magecart #Cyberveille

2026-01-14

Silent Push Uncovers New Magecart Network: Disrupting Online Shoppers Worldwide
#Magecart
silentpush.com/blog/magecart/

2026-01-13

Watch out as a new report reveals a widespread Magecart skimmer campaign targeting users of all major credit cards at online checkout.

Read more: hackread.com/magecart-targets-

#Magecart #CyberSecurity #OnlineShopping #InfoSec

2026-01-13
New Magecart Skimming Network Targets Global Payment Providers on E-commerce Websites, Including Mastercard, American Express
2026-01-02

🧩 3️⃣ Masivo robo de datos de pago de clientes de páginas web con malware Magecart.

Cibercriminales han estado utilizando el malware Magecart para insertar código malicioso en tiendas online legítimas, de modo que captura datos de tarjetas de crédito y débito justo cuando los clientes compran.

Este código invisible roba números de tarjeta, fechas de vencimiento y códigos CVV, comprometiendo la seguridad de miles de personas sin que lo noten al comprar.

🔒 ¿Tus compras en línea son realmente privadas… o alguien más está leyendo lo que escribes?

#Privacidad #Ciberseguridad #Magecart #PagosOnline

blog.elhacker.net/2025/12/masi

2025-10-22

Smashing Security podcast #440: How to hack a prison, and the hidden threat of online checkouts - A literal insider threat: we head to a Romanian prison where “self-service” web kiosks al... grahamcluley.com/smashing-secu #smashingsecurity #securitythreats #vulnerability #paymentcard #guestblog #lawℴ #dataloss #magecart #podcast #romania #prison #pci

2025-09-08

📢 H1 2025: Microsoft et les appliances périmétriques en tête des exploits, essor des RATs, fraude NFC et Magecart
📝 Source: Recorded Future / Insikt Group.
📖 cyberveille : cyberveille.ch/posts/2025-09-0
🌐 source : recordedfuture.com/research/h1
#IOC #Magecart #Cyberveille

2025-03-16

This #Magecart smart contract got updated recently and is now pointing to keritysuc[.]xyz

infosec.exchange/@threatcat_ch

2025-02-28

While investigating an infected website, we noticed call to BSC testnet contract 0x0967296defa0fd586c9ede5730380e2b059fab95 : testnet.bscscan.com/address/0x

The contract’s content is clearly malicious and connects over WebSocket to suckerity[.]xyz (behind Cloudflare), not related to #ClearFake, but reminds us #Magecart related injections:

2025-02-28

#etherhiding (hiding malicious code in blockchain based smart contracts) is not only by #ClearFake related actors – but now also for #Magecart 👇

2025-02-19

📬 Magecart-Angriff auf Magento: Kreditkartendaten über Image-Tags abgefangen
#Cyberangriffe #Datenschutz #Malware #Datendiebstahl #Datenklau #eCommerce #Magecart #Magento #Skimming sc.tarnkappe.info/addaeb

Tech Cybersecurity Nieuwstech_cybersecurity_nieuws@mastodon.nl
2025-01-30
2025-01-20

Had a productive evening yesterday :)
#skimming #magecart #hunting

2024-10-12

🚨 Did you know that cybercriminals are casually chatting within compromised code to split profits? 😳 The "Mongolian Skimmer" campaign reveals just that, using JavaScript obfuscation and anti-debugging tactics to evade detection.

🔒 Cybersecurity Tip: Stay ahead of threats by regularly auditing your JavaScript for obfuscated code and setting strong Content Security Policies (CSPs) to prevent unauthorized scripts from running.

🛡️ How confident are you in the security of your client-side scripts? Have you seen anything suspicious lately? Let’s discuss!

📖 Dive deeper into the story and learn how to protect yourself: guardiansofcyber.com/threats-v

#Cybersecurity #GuardiansOfCyber #Guardians #JavaScriptSecurity #SkimmingAttacks #WebSecurity #ClientSideSecurity #Magecart #ThreatIntelligence #CyberThreats

Kevin Karhan :verified:kkarhan@infosec.space
2024-10-10

@nieldk @jerry TBH, I'm not that concerned about this re: @internetarchive ...

  • I just think that attacking the #InternetArchive is an asshole move that is unjustifyable at best and a waste of resources at worst.

Like aside from some hashed passwords there is nothing for the taking! This ain't like some #MageCart-style #malware where they siphon off payment details.

  • "EVERYONE HATES THAT" is the reaction re: #InternetArchiveHack because there's neither #profit nor #fame in it, so mostl likely a case of "weapons-grade boredom"...
Kevin Karhan :verified:kkarhan@infosec.space
2024-10-06

@ashleyspencer @sunguramy and they don't have like an #API to just #curl said image files with?

I mean that certainly prevents most #MageCart-Style #Carding attacks that plague #WooCommerce & #Magento-based #Webshop systems...

2024-08-22

Over 100,000 Oregon Zoo visitors warned that their payment card details were stolen in security breach - Cybercriminals have succeeded in stealing the payment card information from over 110,000 ... bitdefender.com/blog/hotforsec #paymentcard #guestblog #oregonzoo #dataloss #magecart #malware

2024-01-01

New #Magecart campaign targeting #ecommerce sites! Rogue #WordPress plugin creates fake admin users, injects malicious code to steal credit card info. Stay vigilant—check plugins carefully and remove any suspicious ones immediately! #cybersecurity

thehackernews.com/2023/12/rogu

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst