Site icon LIFARS, a SecurityScorecard company

Java Keylogger Malware Puts Online Shoppers at Risk

An exploit that forwards credit card details from checkout pages stems from a Java keylogger malware, researchers have discovered. The credit card information is stolen from online checkout forms commonly found on shopping websites. Several dozen websites have been compromised, according to conservative estimates.

Websites running the open-source ecommerce platform by Magento have been compromised by a malware that forwards credit card details over to attackers in real-time.

A blog by Magento Commerce claims that attackers are “likely using” admin privileges or access to a targeted website’s database to implement the exploit. While the open source platform confirmed the exploit of websites powered by its commerce toolkit, it pointed the finger at websites that hadn’t implemented a February 2015 patch, for falling prey to the malware.

An excerpt from the blog read:

No new attack vector has been identified and it appears most impacted sites have not implemented the February 2015 ‘Shoplift Patch’, or the patch was implemented after they were compromised.

While stopping short of addressing the exploit as a malware keylogger or even a spyware keylogger, Magento confirmed that the JavaScript exploit siphoned credit card information over to an external website.

As a result, Magento has moved to remind all of its merchants to regularly implement patches as a part of its “security best practices”, highlighting the incident as a stark reminder to do so.

Further, Magento detailed how merchants can determine if their website has been exploited by the java keylogger malware.

First, admins are advised main page and look for the page source before searching for the following strings.

eval(atob(

regexp(“checkout

Regexp(‘checkout

Regexp(“onepage

Regexp(‘onepage

Regexp(“onestep

Regexp(‘onestep

 The discovery of even a single string means that the website is compromised.

From here, Magento recommends a simple list of instructions to patch a compromised website:

Note: we have also noticed /js/index.php, a native Magento file, being used to collect stolen information. Make sure to review this file and compare with original.

The complete report by Magento’s security team can be found here.

Image credit: Pexels.

Exit mobile version