Magecart: The American gun manufacturer Smith & Wesson had its online store compromised by an e-commerce website skimmer. Originally compromised on November 27, 2019, the skimmer was active until after Black Friday. The threat actor injected malicious JavaScript into the checkout page of the company to steal the credit card information that was entered into the website throughout the time it was active. While investigating occurrences of newly registered domains, Sanguine Security’s Willem de Groot found that the same threat actor that was registering domains for their company was also registering look-alike domain names similar to Smith & Wesson’s domain. According to researchers, the script is not easy to see because it will load either a non-malicious script or a malicious script, depending on the IP address of the visitor to the site and the section of the website that was visited. Most likely this was done to avoid detection by automated services that watch for malicious JavaScript injects.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security