Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical PHP SOAP Flaws Enable Remote Code Execution Attacks
May 12, 2026
Magecart Hackers Abuse GTM for Credit Card Sk Google Manager
May 12, 2026
TeamPCP Compromises Checkmarx Jenkins Compromised Plugin
May 12, 2026
Home/CyberSecurity News/Magecart Hackers Abuse GTM for Credit Card Sk Google Manager
CyberSecurity News

Magecart Hackers Abuse GTM for Credit Card Sk Google Manager

Online shoppers face a heightened risk of digital theft as hackers linked to the notorious Magecart group are now concealing credit card skimmers within Google Tag Manager (GTM) containers. This...

Sarah simpson
Sarah simpson
May 12, 2026 5 Min Read
1 0

Online shoppers face a heightened risk of digital theft as hackers linked to the notorious Magecart group are now concealing credit card skimmers within Google Tag Manager (GTM) containers. This troubling development transforms a widely trusted web tool into a silent weapon, actively compromising unsuspecting consumers. A recent analysis details how these threat actors exploit GTM for malicious purposes, effectively hiding their digital skimmers to steal

Google Tag Manager is used by millions of websites to manage marketing and analytics scripts from a single, trusted location. Because it serves code from the highly trusted domain googletagmanager.com, most security tools and website owners rarely question scripts loaded through it.

That trust is exactly what attackers are exploiting, using fake GTM containers to deliver malicious code that silently steals payment data in real time.

Malicious script (Source - Sucuri)
Malicious script (Source – Sucuri)

Analysts at Sucuri tracked this campaign closely, uncovering a well-organized operation tied to a long-running threat actor called ATMZOW. This skimmer has been linked to Magecart activity dating back to 2015, when it was first connected to the Guruincsite infection that compromised thousands of Magento-powered stores. The fact that this same group is still operating, and still evolving, is a clear sign that the threat is far from over.

The scale of the problem became clear when Sucuri’s SiteCheck scanner detected known malicious GTM containers on 327 sites in just the first 11 months of 2023. One container, GTM-WJV6J6, was flagged 178 times that year before Google stepped in and removed it. But when one container gets shut down, the attackers simply create new ones and start reinfecting sites all over again.

What makes this campaign especially dangerous is how deeply it has embedded itself into the normal flow of web activity. A GTM script looks completely ordinary at first glance, which is why so many infections go unnoticed until real damage has been done. Shoppers enter their card details on what appears to be a legitimate checkout page, completely unaware that their data is being quietly sent to attackers.

How the Google TM Skimmer Works

The ATMZOW skimmer uses a chain of obfuscated scripts delivered through GTM containers to silently harvest payment card data from checkout pages. Once a compromised site loads the malicious container, the script checks whether the visitor is on a checkout or one-page payment page before activating.

ATMZOW style of code (Source - Sucuri)
ATMZOW style of code (Source – Sucuri)

This targeted approach helps the malware stay quiet and reduces the chance of triggering automated security scans.

To stay ahead of researchers, the skimmer randomly selects two domains from a rotating list of 40 newly registered addresses to load its payload. These domains are saved in the browser’s local storage, so the same pair appears on repeat visits, making it much harder for analysts to map out the full infrastructure.

The domains were registered through Hostinger in three batches in November 2023 and designed to blend in using art-related words combined with analytics-style terms, such as cdn.sketchinsightswatch[.]com and cdn.colorpalettemetrics[.]com. Attackers also hid their servers behind a Cloudflare firewall to prevent IP-based detection, though researchers were eventually able to identify the underlying servers.

Obfuscation Tactics and Persistent Reinfestation

What separates the ATMZOW skimmer from simpler tools is the depth of its obfuscation. The malicious code uses a custom decoding mechanism that depends on the exact character length of the script, meaning any modification will break the decoder entirely. This design makes it particularly resistant to automated analysis and static detection tools.

When Google removed the original GTM-TVKQ79ZS container after reports of malicious activity, attackers quickly created two replacement containers, GTM-NTV2JTB4 and GTM-MX7L8F2M, and resumed infecting sites.

On at least one occasion, this skimmer was found operating alongside a separate WebSocket-based skimmer on the same compromised site, suggesting some victims were being hit by multiple threat actors at once. Website owners should treat any unfamiliar script as a potential red flag, especially those not placed there by an administrator. For Magento site owners, it is worth thoroughly reviewing templates stored in core_config_data, as this is the most common location where client-side skimmer scripts are planted.

Indicators of Compromise (IoCs):-

Type Indicator Description
GTM Container ID GTM-WJV6J6 Malicious GTM container used to inject skimmer; detected 178 times in 2023
GTM Container ID GTM-TVKQ79ZS GTM container carrying new ATMZOW skimmer variant (November 2023)
GTM Container ID GTM-NTV2JTB4 Replacement malicious container created after GTM-TVKQ79ZS was removed
GTM Container ID GTM-MX7L8F2M Second replacement malicious container used for reinfection
Domain gtm-statistlc[.]com Malicious script source used in earlier GTM-WJV6J6 campaign (created July 11, 2023)
Domain goqle-analytics[.]com Lookalike analytics domain used in same campaign
Domain webstatlstics[.]com Lookalike statistics domain used in same campaign
Domain lgstd[.]io WebSocket-based skimmer found alongside GTM skimmer on same compromised site
Domain cdn.sketchinsightswatch[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.colorpalettemetrics[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.artisticpatterndata[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.visualartexplorer[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.picturedataminer[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.paintedworldstats[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.drawinginfopro[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.artistictrendsmap[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.sketchanalyticsvault[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.colorschemeobserver[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.artdataharvest[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.gallerytrendstracker[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.picturetrendsmonitor[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.brushstrokemetrics[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.imagepatternprofiler[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.artisticexpressiondb[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.sketchdataanalytics[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.canvastrendstracker[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.visualartinsights[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.strokepatternanalysis[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.artstattracker[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.drawdatahub[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.sketchmetrics[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.paintinfoanalyzer[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.imageinsightvault[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.visualdatacollector[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.artworkanalytics[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.sketchtrendsmonitor[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.picinfometrics[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.drawnstatsgather[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.artistictrendsprobe[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.gallerydatainsight[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.strokeanalysislab[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.imagestatistician[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.artprofilingtool[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.sketchdataharbor[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.picturetrendsdb[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.drawninfoinspector[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.arttrendtrackers[.]com ATMZOW payload delivery domain (Nov 2023 batch)
Domain cdn.PaintedVisionsStats[.]com ATMZOW payload delivery domain (Nov 2023 batch)
IP Address 31.220.21[.]211 Hostinger server hosting ATMZOW domains
IP Address 31.220.21[.]240 Hostinger server hosting ATMZOW domains
IP Address 62.72.7[.]89 Hostinger server hosting ATMZOW domains
IP Address 62.72.7[.]90 Hostinger server hosting ATMZOW domains

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

TeamPCP Compromises Checkmarx Jenkins Compromised Plugin

Next Post

Critical PHP SOAP Flaws Enable Remote Code Execution Attacks

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OpenAI Daybreak Automates Detects and Fix Vulnerabilities
May 12, 2026
BitUnlocker Downgrade Attacks on Windows Allows Access
May 12, 2026
Exploit: Hackers Take Over cPanel Abuse CVE-2026-41940
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us