"Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems"

Researchers discovered that Magecart campaigns have been skimming payment-card credentials of unsuspecting customers using three online restaurant-ordering systems, impacting around 300 restaurants that use the services and compromising tens of thousands of cards so far. According to researchers from Recorded Future, two separate ongoing Magecart campaigns have injected e-skimmer scripts into the online ordering portals of restaurants using three different platforms: MenuDrive, Harbortouch, and InTouchPOS. One of the campaigns appears to have begun in November of last year, and the other in January of this year. Magecart refers to cybercriminals who use card-skimming technology to steal payment card credentials at point-of-sale (POS) or e-commerce systems. These stolen credentials are typically sold on hacker forums on the dark web. Researchers noted that the infections on the restaurants' websites affected in the two campaigns observed by Recorded Future often result in the exposure of customers' payment card data and personal information. They have identified over 50,000 compromised payment card records from campaigns for sale on the dark web so far, and they anticipate that more stolen data will be posted in the future. This article continues to discuss the activities and impact of the two ongoing Magecart campaigns. 

Threatpost reports "Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems"

Submitted by Anonymous on