26 December 2023

International police op identified 443 e-shops infected with credit card stealers


International police op identified 443 e-shops infected with credit card stealers

Europol, in cooperation with the European Union Agency for Cybersecurity (ENISA) and law enforcement authorities from 17 countries identified hundreds of online merchants infected with credit card skimmers as part of an effort aimed at combating the rising threat of digital skimming attacks.

Over the course of a two-month operation, the alliance, supported by national Computer Security Incident Response Teams (CSIRT), has notified 443 online merchants about the compromise of their customers' credit card and payment card data.

Digital skimming is a type of cybercrime where perpetrators steal sensitive payment information during the online checkout process, has become a rampant issue affecting online businesses worldwide. The criminals employ sophisticated information technology, known as JavaScript sniffers or JS-sniffers, to intercept data without alerting either the customers or the online merchants.

During the operation, 23 families of JS-sniffers were detected and identified. Some of the identified families include ATMZOW, health_check, FirstKiss, FakeGA, AngryBeaver, Inter, and R3nin. These families of JS-sniffers were found to be compromising the security of various online platforms, putting the financial information of countless users at risk.

Earlier this month, security researchers at Sucuri spotted a Magecart campaign that leveraged a malicious WordPress plugin capable of creating bogus administrator users and injecting malicious JavaScript code to steal credit card information.


Back to the list

Latest Posts

Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024
US seizes 32 domains linked to Russian Doppelganger influence campaign

US seizes 32 domains linked to Russian Doppelganger influence campaign

The domains, used to disseminate propaganda, were seized as part of a broader effort to disrupt Russia’s attempts to interfere in the 2024 US Presidential Election.
5 September 2024