A new Magecart card skimming campaign has been discovered , which exploits 404 error pages on online retailer websites  . This campaign specifically targets Magento and WooCommerce sites  , with a focus on large organizations in the food and retail sectors .
The attackers manipulate the default 404 error page to hide and execute their code , allowing them to steal customers’ credit card data. They achieve this by concealing code in the HTML image tag’s “onerror” and an image binary , making it appear as the Meta Pixel code snippet . By altering the default error page    , the attackers can display a fake form for visitors to fill out with sensitive details , such as credit card numbers . Once the information is shared , victims receive a fake “session timeout” error while the data is sent to the hackers via an image request URL . This method helps the attackers avoid detection by network monitoring tools .
The discovery of this Magecart card skimming campaign highlights the need for organizations, especially those using Magento and WooCommerce, to remain vigilant and implement robust security measures . The attackers’ ability to exploit 404 error pages and manipulate code demonstrates the constant evolution and increasing sophistication of cybercriminal tactics. Detecting and mitigating these attacks becomes more challenging as techniques become more advanced. It is crucial for organizations to stay updated on the latest security measures and remain proactive in protecting against these evolving tactics employed by cybercriminals.