American Cancer Society Data Breach: Credit Card Stealing Malware Identified

0
797

After so many reported credit card thefts in 2019, American Cancer Society has become the latest victim as a credit card stealing malware has been reportedly found in its online store.

This has raised serious concern as the same malware was reported to have been used to steal a bunch of credit card details from British Airways. For now, the number of affected victims is not clear, but the number is expected to be huge.

Recently, it was reported that Joker’s Stash has expanded its infrastructures to accommodate a large volume of credit cards, indicating the market boom of credit card details on the dark web.

American Cancer Society

Image Source: www.trustwave.com

From the report, the dangerous malware was only detected on the American Cancer Society website on 24 October 2019, and it is suspected that it was launched not long ago. For this reason, individuals who visited the American Cancer Society website recently have been advised to contact their credit card providers.

It is worth noting that the card can be changed to block any future transactions by criminals. However, the Personal Identified Information would be used to commit a more dangerous crime. 

According to the report, a cybersecurity expert who found the malware revealed that the malware was designed to look like a normal analytic code. However, it was purposely meant to steal credit card details from visitors of the American Cancer Society website.

Interestingly, the threat actor behind this malware is Magecart who mainly sells the stolen credit card details on the dark web or use the Personal Identified Information to commit fraud. It was reported that the hacker designed the malware to automatically send the obtained credit card information from the American Cancer Society website to a third party server.

On the authority of the report revealed by Techcrunch, the malicious code was decoded, of which the web address of the third party server was identified. Willem De Groot, the cybersecurity researcher who found the malicious code on the website revealed that they observed that the domain was registered in Moscow, but the website loads nothing other than a decoy page. De Groot called the anti-fraud hotline of the American Cancer Society to inform them about the activity of Magecart.

Amercan Cancer Society

Image Source: www.techcrunch.com

However, the code was not removed immediately according to the report. The code was removed on the following day, 25 October after they reached out to them.
Magecart is a hacker group that basically target online shopping cart systems to steal payment card information. They have been active since 2016, and have staged a number of high profile attacks stealing data from many popular companies.

The Magecart hackers usually launch their attack by substituting a part of the JavaScript code. This is done by either modifying the magento source or redirecting the shopping cart to a website that hosts the malware.

Recently, it was uncovered that this hacker group has successfully hit about 80 e-commerce websites stealing a huge number of payment card detail. They are also linked to the payment card attack of Forbes and Newegg. It is expected that websites that are responsible for taking payment card details from visitors invest in cybersecurity to keep visitors safe.

Source: TechCrunch


Disclaimer: Darkweblink.com does not promote or endorse claims that have been made by any parties in this article. The information provided here is for the general purpose only and unintended to promote or support purchasing and/or selling of any products and services or serve as a recommendation in the involvement of doing so. Neither Darkweblink.com nor any member is responsible directly or indirectly for any loss or damage caused or alleged to be caused by or in relation with the reliance on or usage of any content, goods or services mentioned in this article.


Tags: #Darknet #.onion_Sites_Links #Deep_Web_Links_and_Web_Sites #Dark_Web_Links_Hidden_Wiki #Dark_net_Links

LEAVE A REPLY

Please enter your comment!
Please enter your name here

*

code