Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsWidespread Magecart Campaign Targets Users of All Major Credit Cards
Widespread Magecart Campaign Targets Users of All Major Credit Cards
Cybersecurity

Widespread Magecart Campaign Targets Users of All Major Credit Cards

•January 13, 2026
0
HackRead
HackRead•Jan 13, 2026

Companies Mentioned

Silent Push

Silent Push

American Express

American Express

AXP

Mastercard

Mastercard

MA

UnionPay International

UnionPay International

Why It Matters

The scheme demonstrates how sophisticated web‑skimming can bypass conventional e‑commerce defenses, putting millions of cardholders at risk and forcing merchants to rethink script security.

Key Takeaways

  • •Magecart skims all major credit‑card networks worldwide
  • •Malicious scripts delete themselves when admin bar detected
  • •Fake payment form mimics real, captures data then restores
  • •Hosted on benign‑looking domains like cdn‑cookie.com
  • •Stores must enforce strict script‑allow lists

Pulse Analysis

The Magecart phenomenon has moved from isolated incidents to a coordinated, global threat that now targets every major card brand. Silent Push’s latest investigation reveals a campaign operating since 2022, siphoning Mastercard, American Express, Discover, Diners Club, JCB and UnionPay credentials across thousands of e‑commerce sites. By embedding malicious JavaScript on seemingly harmless domains, the attackers exploit the trust placed in third‑party scripts, turning ordinary checkout pages into data‑harvesting conduits. This level of scale underscores how web‑skimming has become a foundational tool in the cyber‑crime arsenal, and the financial fallout from such breaches can reach millions, eroding consumer confidence.

The new strain of Magecart code is engineered for stealth. It monitors the browser for the WordPress Admin Bar and self‑destructs the moment an administrator logs in, effectively hiding from routine site audits. Its most deceptive feature is the ‘double‑entry’ trick: the script replaces the genuine payment widget with a replica that captures card number, name and address, then instantly restores the original form and displays a fabricated error. Shoppers, convinced they made a typo, re‑submit their details, unknowingly delivering their credentials to the threat actors. The script also logs the victim’s IP, enabling later credential stuffing attacks.

Mitigating this attack requires a shift from perimeter defenses to rigorous script integrity controls. E‑commerce operators should adopt content‑security‑policy headers, employ subresource integrity checks, and whitelist only verified third‑party providers. Continuous monitoring tools that detect DOM‑mutation anomalies can flag suspicious form swaps in real time. For consumers, vigilance—such as scrutinizing repeated payment prompts and regularly reviewing statements—remains essential. As regulators tighten standards for payment data protection, the industry’s collective response will determine whether Magecart’s invisible skimmers can be contained. Adopting zero‑trust networking principles further reduces the attack surface for malicious scripts.

Widespread Magecart Campaign Targets Users of All Major Credit Cards

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...