Network Security, Vulnerability Management

Hackers compromising checkout process on retail sites, redirecting shoppers to phishing page

Here's a two-for-one deal that no retail customer wants: Researchers at Sucuri has uncovered a sampling of novel e-commerce attacks that combine the classic duplicity of phishing schemes with the insidiousness of malicious webpage redirects.

According to a Sucuri blog post, hackers are compromising legitimate retail sites through their e-commerce solutions, including WooCommerce and PrestaShop, by adding a short, malicious JavaScript snippet to the code that runs checkout pages. The report did not list specific websites that were targeted.

The compromise redirects purchasing customers to fake, phishing pages on third-party sites, at least some of which feature the domain name cwcargo.com. Shoppers think they are filling out a checkout form but are actually giving away their personal information, credit card data and Paypal credentials to cybercriminals. The checkout forms don't necessarily mimic the real site perfectly, but new or inattentive customers may not notice.

Bradley Barth

As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.