Login Register

American Cancer Society Affected by Data Breach as Credit Card Stealing Malware Identified on Online Store

By Alex Nimoy Oct. 31, 2019, 3:09 p.m.

After so many reported credit card thefts in 2019, American Cancer Society has become the latest victim as a credit card stealing malware has been reportedly found in its online store.

This has raised serious concern as the same malware was reported to have been used to steal a bunch of credit card details from British Airways. For now, the number of affected victims is not clear, but the number is expected to be huge.

Recently, it was reported that Joker’s Stash has expanded its infrastructures to accommodate a large volume of credit cards, indicating the market boom of credit card details on the dark web.

From the report, the dangerous malware was only detected on the American Cancer Society website on 24 October 2019, and it is suspected that it was launched not long ago. For this reason, individuals who visited the American Cancer Society website recently have been advised to contact their credit card providers.

It is worth noting that the card can be changed to block any future transactions by criminals. However, the Personal Identified Information would be used to commit a more dangerous crime.

According to the report, a cybersecurity expert who found the malware revealed that the malware was designed to look like a normal analytic code. However, it was purposely meant to steal credit card details from visitors of the American Cancer Society website.

Interestingly, the threat actor behind this malware is Magecart who mainly sells the stolen credit card details on the dark web or use the Personal Identified Information to commit fraud. It was reported that the hacker designed the malware to automatically send the obtained credit card information from the American Cancer Society website to a third party server.

On the authority of the report revealed by Techcrunch, the malicious code was decoded, of which the web address of the third party server was identified. Willem De Groot, the cybersecurity researcher who found the malicious code on the website revealed that they observed that the domain was registered in Moscow, but the website loads nothing other than a decoy page. De Groot called the anti-fraud hotline of the American Cancer Society to inform them about the activity of Magecart.

However, the code was not removed immediately according to the report. The code was removed on the following day, 25 October after they reached out to them.
Magecart is a hacker group that basically target online shopping cart systems to steal payment card information. They have been active since 2016, and have staged a number of high profile attacks stealing data from many popular companies.

The Magecart hackers usually launch their attack by substituting a part of the JavaScript code. This is done by either modifying the magento source or redirecting the shopping cart to a website that hosts the malware.

Recently, it was uncovered that this hacker group has successfully hit about 80 e-commerce websites stealing a huge number of payment card detail. They are also linked to the payment card attack of Forbes and Newegg. It is expected that websites that are responsible for taking payment card details from visitors invest in cybersecurity to keep visitors safe.

Do you find this content interesting?
This is just a MIRROR ! Find us via our Main TOR domain
And Let us know by leaving a comment and a rating.

Also, don't forget to follow our Official Telegram Channel to stay informed and safe by Reading  NOIRdotNEWS


Please visit our onion version to comment.