Get started in 5 minutes!

Malware Library

What is

Often found on online stores, is a common digital skimmer (also known as Magecart) that was first detected on Sep 11th, 2022. So far, Sansec has discovered this malware on 912 different victim stores. The most common attacked platform is Magento 2.

A typical sample of the malware in the wild can be observed when selecting "view page source" in your browser. It looks like this:

How does work?

The skimmer is loaded on the checkout page of a typical store. It lives in the browser of an unsuspecting online customer. Whenever he or she enters her payment information, the private data is siphoned off to an offshore server. Usually, this data is then sold on the dark web within 2-10 weeks.

Adobe released a fix for CVE-2022-24086 in February, 2022. A bug in the Magento template parser allows anyone to execute server-side code on an unpatched Magento store.

This issue started getting mass-exploited in late summer 2022, when exploit kits were offered for sale on dark web forums.

NB. The presence of this code in your database does NOT indicate a successful attack. However, you should really analyse your systems for indicators of a compromise.

How to clean

The malware can be easily removed. It is usually hidden in a database field, such as core_config_data, cms_blocks or cms_pages. Sometimes the malware is appended to a specific .js code file. However just cleaning the malware is not enough: you need to discover the root cause of this malware, otherwise you will soon find the same malware back in your store.

Sansec specializes in protection of online stores. We have investigated and cleaned thousands of stores. We decided to put our knowledge into our software solution eComscan, so that everybody can use it. Save yourself lots of work and headaches and download eComscan today!

Download eComscan

This page was last updated at Sep 21st, 2023

Need expert advice?

We are here to help!

Get in touch