Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/CyberSecurity News/Hackers Hide Magecart Skimmer on Magento Using SVG On
CyberSecurity News

Hackers Hide Magecart Skimmer on Magento Using SVG On

A massive Magecart campaign, identified on April 7, 2026, has compromised 99 Magento e-commerce stores. This sophisticated attack utilizes an innovative evasion technique, injecting credit card...

Jennifer sherman
Jennifer sherman
April 10, 2026 2 Min Read
8 0

A massive Magecart campaign, identified on April 7, 2026, has compromised 99 Magento e-commerce stores. This sophisticated attack utilizes an innovative evasion technique, injecting credit card skimmers directly into checkout pages through invisible Scalable Vector Graphics (SVG) elements.

This “double-tap” skimmer displays a highly convincing fake payment overlay before silently redirecting shoppers to the legitimate checkout process, ensuring most victims remain completely unaware of the theft.

To evade traditional scanners, attackers are shifting to inline execution by injecting a hidden 1×1-pixel SVG element directly into a compromised store’s HTML.

SVG Onload Evasion Technique

The entire malicious payload is hidden within the SVG’s onload attribute, base64-encoded with atob() and executed via a setTimeout command.

Because the malware lives entirely inline as a single string attribute, it avoids creating the external script references that typically trigger automated security alerts.

Sansec security experts believe the initial entry vector for these mass infections is the ongoing PolyShell vulnerability, which continues to plague unpatched Magento and Adobe Commerce environments.

The skimmer activates the moment a shopper attempts to finalize their purchase. Using a JavaScript useCapture event listener, the malware intercepts clicks on any checkout button before the store’s legitimate code can respond.

It then generates a full-screen modal overlay titled “Secure Checkout,” complete with a trusted lock icon and real-time validation for credit card numbers.

Once the victim submits their billing information, the skimmer instantly encrypts the stolen data. The script applies an XOR cipher using the key “script” and encodes the final result in base64.

The malware then transmits this packaged data to one of six attacker-controlled domains.

To further mask the theft, the exfiltration endpoint is named /fb_metrics.php, disguising the malicious traffic as routine Facebook analytics data.

After a successful theft, the script drops a marker in the browser and sends the user to the real checkout page to complete their transaction.

According to Sansec research, administrators should immediately review their environments for the following signs of an active infection:

  • All six exfiltration domains, including statistics-for-you.com and morningflexpleasure.com, resolve to a single Netherlands-based IP address: 23.137.249.67.
  • Compromised page sources will feature <svg elements containing suspicious onload attributes and atob() decoding functions.
  • The browser’s local storage contains the key _mgx_cv, which attackers use to prevent payment data for the same victim from being stolen twice.
  • Network traffic logs will show data exfiltration via on fetch() POST requests in no-cors mode, with a hidden iframe serving as a fallback.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwarePatchSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

AWS Patches Critical RCE & Privilege Escalation in

Next Post

Single Line of Code Jailbreaks 11 Including ChatGPT

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us