Hundreds of counterfeit shoe sites hit by Magecart credit card scam

Criminals hope to take advantage of those looking for a pre-Christmas deal

Customers seeking to grab a deal on top-end shoe brands this Christmas have been warned to avoid sites that promise heavily discounted prices as they risk being hit by a highly effective credit card scam.

A host of these websites, which try to exploit the rush by promoting counterfeit goods, have themselves been targetted by a large-scale hacking campaign that involves installing malicious scripts that lift financial information as it's entered, according to Malwarebytes.

Advertisement - Article continues below

The campaign is another example of the use of Magecart scripts, the same tactic used last year during a spate of attacks on high-profile websites, including those owned by Newegg, British Airways and Ticketmaster.

The tactic is now being used against sites that claim to promote goods from highly collectable brands such as Nike, Adidas and Converse, in some cases offering shoes worth over $1,000 for as little as $100 – all of which are counterfeit.

All affected sites were found to be loading a JavaScript file on their checkout page, a skimming script called translate.js, according to Malwarebytes, the final list of which highlights "a massive compromise across several IP subnets".

Some 288 sites have been identified, many of which are still in operation. In fact, we were able to access one such site and locate the Magecart script in action.

When deobfuscating the skimmer, researchers discovered that credit card data and billing addresses were being sent to 103.139.113[.]34, a server based in China. Investigations into several of the domains also revealed that they were all using the same outdated software, namely version 1.9.4.2 of Magento, and version 5.6.40 of PHP, suggesting that hackers simply used a scanner to crawl through the IP ranges and used the same vulnerability on each site.

Skimming tactics of this kind are difficult to entirely stamp out, however, Malwarebytes has urged customers to keep their anti-virus software up to date, and to instal the browser extensions that normally come bundled.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The company also warned users to avoid sites that look like they haven't been updated in a while, particularly as many of these sites still display notes such as "Copyright 2015". Use of third-party payment services, such as PayPal, will also help reduce the need to manually enter card details into websites.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Most Popular

Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/security/data-breaches/355173/marriott-hit-by-data-breach-exposing-personal-data-of-52-million
data breaches

Marriott data breach exposes personal data of 5.2 million guests

31 Mar 2020
Visit/security/cyber-crime/355171/fbi-warns-of-zoom-bombing-hackers-amidst-coronavirus-usage-spike
cyber crime

FBI warns of ‘Zoom-bombing’ hackers amid coronavirus usage spike

31 Mar 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020