Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsMagecart Hack Injects JavaScript to Steal Online Payment Data
Magecart Hack Injects JavaScript to Steal Online Payment Data
CybersecurityEcommerce

Magecart Hack Injects JavaScript to Steal Online Payment Data

•January 21, 2026
0
GBHackers On Security
GBHackers On Security•Jan 21, 2026

Companies Mentioned

X (formerly Twitter)

X (formerly Twitter)

Why It Matters

The attack directly threatens consumer payment data and can cause costly breaches for online retailers, highlighting the urgent need for stronger script‑security controls in e‑commerce platforms.

Key Takeaways

  • •Malicious script hosted on cc-analytics.com/app.js.
  • •Obfuscated JS steals card data via XMLHttpRequest.
  • •Attack infrastructure spans 30+ domains sharing IP 45.61.136.141.
  • •Exfiltration triggers only for card numbers >14 digits.
  • •CSP and SRI can mitigate such script injections.

Pulse Analysis

Magecart groups have long exploited third‑party script inclusion to skim payment data, but the latest campaign demonstrates a heightened level of operational maturity. By leveraging heavily obfuscated JavaScript that only activates when a valid card number is entered, the attackers reduce noise and avoid detection by basic pattern‑matching tools. The use of a single hosting IP across dozens of look‑alike domains suggests a shared infrastructure, enabling rapid redeployment if any single domain is taken down. This modular approach also complicates attribution, as multiple threat actors can reuse the same code base.

Technical analysts deobfuscated the payload using debugger breakpoints and Python string manipulation, revealing event listeners attached to checkout fields and a conditional check for numbers longer than 14 characters. The script then sends the harvested data to pstatics.com via an XMLHttpRequest, a method that blends in with legitimate traffic. Researchers mapped the ecosystem with free tools like URLScan, publicWWW, and WHOIS, uncovering related domains such as jgetjs.com and utilanalytics.com. This open‑source reconnaissance underscores how even modest security budgets can uncover sophisticated threat networks when proper threat‑hunting practices are applied.

For merchants, the takeaway is clear: reliance on third‑party scripts without verification is a high‑risk posture. Implementing a strict Content‑Security‑Policy that whitelists only trusted sources, coupled with Subresource Integrity hashes, can block unauthorized code execution. Isolating payment forms in sandboxed iframes further limits exposure, ensuring that even if a script is injected, it cannot access sensitive fields. Continuous monitoring for unexpected <script> tags and outbound POST requests to unknown domains should become a baseline control, protecting both brand reputation and consumer trust.

Magecart Hack Injects JavaScript to Steal Online Payment Data

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...