This false payment page looks real: until your card information is sent to hidden servers in view.




  • OpenCart websites were injected in silence with malware that mimics the confidence monitoring scripts
  • Script hides in analysis labels and exchange real payment forms in silence for false
  • JavaScript Offered allowed the attackers to go through detection and launch the theft of credentials in real time

A new Magecart -style attack has raised concerns throughout the cyberbullying panorama, aimed at electronic commerce websites that depend on OpenCart CMS.

The attackers injected malicious javascript into destination pages, skillfully hiding their legitimate user analysis and marketing labels such as Facebook Pixel, Meta Pixel and Google Tag Manager.

Leave a Comment

Your email address will not be published. Required fields are marked *