The cyber gang Magecart added another notch to its keyboard managing to infiltrate online electronics retailer Newegg with payment card skimming malware, according to two reports, with industry experts weighing in that such attacks can be avoided through higher levels of vigilance by corporate cybersecurity teams.

Magecart, which was tagged as responsible for the British Airways, Feedify and Ticketmaster breaches, was named by RiskIQ and Volexity as the actor behind this latest attack. In the Newegg case, about 15 lines of Javascript were inserted into the site’s code that skimmed payment card details off each transaction. 

The breach was active for about a month and the research firms noted the extent the attackers went to tailor the attack to Newegg so it would not be spotted.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.