Daily Tech News, Interviews, Reviews and Updates

PayPal in trouble again as Magecart hijacks its transactions

In the onset of the Christmas shopping season, hackers have been having a blast. Magecart, the malicious hacker group known for targeting online shopping cart systems, is actively attacking e-commerce websites again. 

The latest victim 

The Magecart group has reportedly been using a credit-card skimming method to hijack PayPal transactions at checkout. They used a script called window.postMessage to make the malicious process seem more legitimate.

How it happened 

  • The group injected card-skimming scripts on checkout pages in compromised e-commerce websites to steal customers’ payment card details and other information.
  • The attackers hid their malicious code inside an image hosted on the server of the infected online store.
  • The attacker then uses the data stolen from genuine pages (items added in the shopping cart, total invoice amount along with taxes and additional charges), and used it to pre-fill the fake PayPal forms during the victim’s checkout process to make its fake payment form look real.
  • Once a victim enters and submits payment info, the exfiltrated data will be sent (via skimmer) to apptegmaker[.]com, a domain registered in October, and associated with tawktalk[.]com.

This is not the first time that PayPal has been in trouble. In the last month, attackers were seen targeting the users of popular money transfer apps, including Paypal, Cash App, Zelle, and Venmo. 

A network of 39 scam sites was discovered, targeting victims via a PayPal-UPS scam, exploiting some loopholes, and using PayPal as a gateway for stealing money from their victims.

With the rise of serial cyber attackers such as Magecart, especially during the lockdowns and when tech dependence is more than ever before, clients need to be extremely cautious when using online payment apps. Experts suggest using sinkhole domains, updating software with the latest security , segregating servers, and staying alert while entering information online to notice any discrepancies.



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More