Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/Threats/Magecart Attack Steals Credit Cards from Website Customers Checkout
Threats

Magecart Attack Steals Credit Cards from Website Customers Checkout

In 2026, a sophisticated web-skimming campaign targeting online shoppers has intensified, actively compromising e-commerce websites and extracting sensitive payment information during checkout...

David kimber
David kimber
January 14, 2026 3 Min Read
2 0

In 2026, a sophisticated web-skimming campaign targeting online shoppers has intensified, actively compromising e-commerce websites and extracting sensitive payment information during checkout processes.

The attack, identified as part of the broader Magecart family of threats, represents an evolving challenge to online retail security.

Threat researchers have documented extensive infrastructure associated with this long-running campaign, which has operated since at least early 2022.

The malicious network targets major payment providers including American Express, Diners Club, Discover, Mastercard, JCB, and UnionPay, potentially affecting millions of customers globally.

The attack operates through JavaScript injection, where malicious code embeds itself into legitimate e-commerce websites without triggering obvious security alerts.

Once injected, the code remains dormant until visitors reach the checkout page, at which point it initiates its credential-stealing payload.

Chronicling steps in the web skimmer process (Source - Silent Push)
Chronicling steps in the web skimmer process (Source – Silent Push)

The infrastructure relies on compromised domains and bulletproof hosting providers to maintain persistence and avoid detection.

Silent Push analysts and researchers noted that the attackers have advanced knowledge of WordPress internals, leveraging lesser-known features like wp_enqueue_scripts action hooks to integrate malicious scripts into the website rendering process.

The technical sophistication lies in how the malware creates a convincing facade during the payment process.

The skimmer establishes a MutationObserver to monitor webpage changes in real-time, ensuring continuous monitoring of the payment form environment.

Malicious file callout on the checkout page for colunexshop[.]com (Source - Silent Push)
Malicious file callout on the checkout page for colunexshop[.]com (Source – Silent Push)

It then hides the legitimate Stripe payment form and injects a nearly identical fake form that captures card numbers, expiration dates, CVV codes, and billing information.

The fake form includes brand detection logic that recognizes card types and displays corresponding brand images, reinforcing legitimacy to victims.

Sophisticated Data Exfiltration Mechanism

The data collection process captures more than payment details. The malware monitors every input field on the checkout page, harvesting names, addresses, and email information.

Once victims complete the form and click the Place Order button, the skimmer compiles all collected data into a structured object, applies XOR encryption with a hardcoded key of 777, and encodes it in Base64 format.

Improper use of code results in a visible bug on the infected website (Source – Silent Push)

The encrypted payload then transmits via HTTP POST request to exfiltration servers located on compromised infrastructure.

The attack exploits user psychology by displaying payment errors after form submission, misleading victims into believing they entered incorrect information.

Unsuspecting customers typically re-enter credentials into the legitimate form, completing their purchase successfully while remaining unaware their data was already stolen.

This psychological manipulation dramatically increases attack success rates by avoiding suspicion.

The malware includes evasion tactics that detect WordPress administrator status through the admin bar element and automatically disables itself when administrators view the site, significantly extending the campaign’s operational lifespan.

Security researchers predict this multi-year threat will continue targeting vulnerable online stores throughout 2026.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Chrome 144 Released With Fix for 10 Vulnerabilities in V8 Engine

Next Post

Android Bug Breaks Volume Buttons with Select to Speak

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us