Magecart, the e-commerce payment card-skimming threat that has recently victimized Ticketmaster, British Airways, Newegg and other notable companies, is primarily comprised of six major active cybercriminal groups, according to a new joint research report. All of these groups use a version the same skimmer toolset, but they rely on different strategies and in some cases have evolved the malware.

Released jointly by RiskIQ and Flashpoint, the report profiles these half-dozen groups, while noting that many more groups and individuals also play a smaller role within the greater Magecart ecosystem.

The original Magecart, Group 1, reportedly dates back to 2014-15, but no longer exists in its original incarnation.This actor introduced the Magecart skimmer, secretly embedding e-commerce pages with a JavaScript-based tool that would copy data entered into online forms and then send it to a drop server. This would form the foundation for all future Magecart activity. One of the group's early schemes involved tricking U.S.-based job seekers into shipping items purchased with the stolen credit card numbers to Eastern Europe. 

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.