Cybersecurity experts have discovered an ongoing web skimmer campaign similar to Magecart, aiming to pilfer personally identifiable information (PII) and credit card details from e-commerce websites.
What sets this campaign apart from others is its unique approach of using compromised websites as “makeshift” command-and-control (C2) servers. This technique allows the attackers to distribute malicious code discreetly, utilizing the hijacked sites as a cover.
Read More: Magento, WooCommerce, WordPress, and Shopify Exploited in Web Skimmer Attack
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.