Newegg users’ credit card info breached in month-long data hack

The culprits are the same group behind the British Airways and Ticketmaster breaches

Online hardware retailer Newegg has suffered a large-scale payment data breach, which exposed customers' credit card details to hackers for an entire month.

The attackers look to be the same as those behind the British Airways and Ticketmaster UK breaches earlier this month, with researchers referring to the group as Magecart.

"We can assume this attack claimed a massive number of victims," said threat management firm RiskIQ, which exposed the breach along with the security research company Volexity.

The full scope of the attack is not yet known, although Newegg has sent an email to customers informing them of the hack, and that the company is "conducting extensive research" to determine what data was accessed. It promised an FAQ on the breach by 21 September.

Advertisement - Article continues below

IT Pro has contacted Newegg for comment.

The hackers injected 15 lines of Javascript to Newegg's payment page, which skimmed credit card data on desktop and mobile between 14 August and 18 September, when the company eventually shut down the code.

The base code behind the attack was the same as that used in the British Airways breach, with only minor changes made to the form needed to serialise payment information, and the server to send that information to.

Credit: RiskIQ

According to RiskIQ, which also uncovered the code behind the British Airways breach, the Magecart hackers registered a domain through Namecheap. On 14 August, the attackers changed the destination of the domain to a drop server, which received the skimmed credit card information.

"While some Magecart groups still target smaller shops, the subgroup responsible for the attacks against Newegg and British Airways is particularly audacious," said RiskIQ's Yonathan Klijnsma, noting that that the highly targeted attacks use code that "seamlessly integrate into their targets' websites."

Newegg has close to 50 million monthly visitors, and even if a small percentage of that makes purchases, the amount of skimmed credit card information over several weeks could be substantial. The pattern of Magecart attacks in the last month also suggests the approach taken by the attackers is becoming increasingly popular. 

"Historically, threat actors deploying Magecart have targeted small businesses and so stayed largely under the radar," security expert Davey Winder told IT Pro.

"There appears to have been a shift to more audacious attacks, with less concern over stealth, and given the success of these exploits there's no reason to assume they will cease any time soon."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now



Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019

Patch issued for critical Windows bug

11 Dec 2019
Business strategy

Ex-Apple CPU architect accuses the firm of invading privacy

10 Dec 2019
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019