Security News > 2017 > July > How Magecart attackers monetize stolen payment card info (Help Net Security)
The Magecart campaign, aimed at compromising online shops with malicious JavaScript code to collects payment card info, is still going strong, and researchers have pinpointed another way threat actors behind it monetize the stolen information. First spotted in October 2016 by RiskIQ and ClearSky researchers, Magecart mainly hits e-commerce sites running outdated and unpatched versions of shopping cart software from Magento, Powerfront, and OpenCart. After gaining access to the web platforms, the attackers change the … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/PM7ZqMzjqGo/