The world-famous storage solution provider Tupperware has had its website compromised by attackers to steal credit card payment details at checkout. Discovered by Malwarebytes researchers, the cybercriminals used a method that is different than recent attacks against online shopping checkout pages. Instead of modifying the website’s JavaScript code to steal from the form fields of the checkout page, the attackers integrated a malicious iframe that displayed a fake payment form field to customers. The iframe loaded the content from “deskofhelp[.].com,” a domain that was only recently created and is hosted on a server with multiple phishing domains. The JavaScript code to load the iframe was hidden inside a PNG image file hosted on the Tupperware web server; the JavaScript was appended to the end of the image data. Tupperware has fixed the issue and the payment form is now loading the payment form from the legitimate domain cybersource.com, which is owned by Visa.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security