HackDig : Dig high-quality web security articles for hacker

Tupperware Hit By Card Skimmer Attack

2020-03-25 18:30
Malicious code was found hidden inside graphics files on the storage container maker's e-commerce website.

Tupperware famously locks in food's freshness, but hackers could not be locked out of the company's e-commerce site. The primary Tupperware site, along with several localized versions, were compromised by digital credit card skimmer disguised inside an image file.

Researchers at Malwarebytes Labs discovered the malicious code when they noticed an anomaly in an iframe container. While the researchers say they don't know what the infection vector was, the malicious campaign is ongoing and, at press time, still active.

The researchers note several details in the malicious code that indicate attackers less polished in their craft than other well-known criminal gangs are involved.

"This does indeed sound like the work of a new cybergang that has not scaled operations yet," Mounir Hahad, head of Juniper Threat Labs at Juniper Networks, told Dark Reading. "The domain name they chose to register was not customized to blend into their target victim's normal website operations, and based on DNS resolution telemetry, it does not seem to have reached any meaningful scale. Nonetheless, this may be the blueprint of future similar attacks on other websites."

Read more here.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "What Should I Do If Someone Is Impersonating My Company in a Phishing Campaign?"


Source: m_?9047331/di-d/d/kcatta-remmiks-drac-yb-tih-erawrepput/sehcaerb-skcatta/moc.gnidaerkrad.www

Read:165 | Comments:0 | Tags:No Tag

“Tupperware Hit By Card Skimmer Attack”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud