• OpenCart web sites had been silently injected with malware that mimics trusted monitoring scripts
  • Script hides in analytics tags and quietly swaps actual fee varieties for pretend ones
  • Obfuscated JavaScript allowed attackers to slide previous detection and launch credential theft in actual time

A brand new Magecart-style assault has raised issues throughout the cybersecurity panorama, focusing on ecommerce web sites which depend on the OpenCart CMS.

The attackers injected malicious JavaScript into touchdown pages, cleverly hiding their payload amongst legit analytics and advertising and marketing tags reminiscent of Fb Pixel, Meta Pixel, and Google Tag Supervisor.


Source link