Is your store’s newsletter being used for phishing?
by Sansec Forensics Team
Published in Threat Research − November 10, 2023
Cybercriminals in eCommerce are diversifying their targets, now aiming at entire customer databases instead of just stealing credit cards. A recent incident revealed this trend: a hacked Magento admin account was exploited to launch a phishing campaign through the platform's newsletter system, reaching all registered customers.The phishing site, hosted on Cloudflare R2 (
https://pub-7f69134e44ab4a03bb5e13c4894ffb4f.r2.dev/file.html), is designed to harvest passwords. Phishing is typically a high-risk, high-reward activity for cybercriminals, often leading to rapid detection. Interestingly, in this case, the attackers preferred phishing to the usual payment skimming methods. This shift could be due to the increasing effectiveness of multi-factor authentication in Europe, which diminishes the value of stolen payment card data.
This change in tactics shows that even online stores with secure, outsourced payment processes are not immune to cyber threats.
We have updated our eComscan detection heuristics to cover this attack vector, which is instantly available to all Sansec customers.
Thanks to our partner Savvii for their diligent investigation and professional followup.
What is Magecart?
Also known as digital skimming, this crime has surged since 2015. Criminals steal card data during online shopping. Who are behind these notorious hacks, how does it work, and how have Magecart attacks evolved over time?About Magecart