Thursday, April 9, 2026

Hackers use pixel-large SVG trick to cover bank card stealer


A large marketing campaign impacting practically 100 on-line shops utilizing the Magento e-commerce platform hides credit score card-stealing code in a pixel-sized Scalable Vector Graphics (SVG) picture.

When clicking the checkout button, the sufferer is proven a convincing overlay that may validate card particulars and billing knowledge.

The marketing campaign was found by eCommerce safety firm Sansec, whose researchers imagine that the attacker possible gained entry by exploiting the PolyShell vulnerability disclosed in mid-March.

Wiz

PolyShell impacts all Magento Open Supply and Adobe Commerce steady model 2 installations, permitting unauthenticated code execution and account takeover.

Sansec warned that greater than half of all weak shops have been focused in PolyShell assaults, which in some instances deployed cost card skimmers utilizing WebRTC for stealthy knowledge exfiltration.

Within the newest marketing campaign, the researchers discovered that the malware is injected as a 1×1-pixel SVG factor with an ‘onload’ handler into the goal web site’s HTML.

“The onload handler incorporates all the skimmer payload, base64-encoded inside an atob() name and executed through setTimeout,” Sansec explains.

“This method avoids creating exterior script references that safety scanners sometimes flag. The complete malware lives inline, encoded as a single string attribute.”

When unsuspecting consumers click on checkout on compromised shops, a malicious script intercepts the press and shows a faux “Safe Checkout” overlay that features card particulars fields and a billing type.

Cost knowledge submitted on this web page is validated in actual time utilizing the Luhn verification and exfiltrated to the attacker in an XOR-encrypted, base64-obfuscated JSON format.

Decoded payload
Decoded payload
Supply: Sansec

Sansec recognized six exfiltration domains, all hosted at IncogNet LLC (AS40663) within the Netherlands, and every getting knowledge from 10 to fifteen confirmed victims.

To guard towards this marketing campaign, Sansec recommends the next:

  • Search for hidden SVG tags with an onload attribute utilizing atob() and take away them out of your website recordsdata
  • Examine if the _mgx_cv key exists in browser localStorage, as this means cost knowledge might have been stolen
  • Monitor and block requests to /fb_metrics.php or any unfamiliar analytics-like domains
  • Block all site visitors to the IP tackle 23.137.249.67 and related domains

As of writing, Adobe has nonetheless not launched a safety replace to deal with the PolyShell flaw in manufacturing variations of Magento. The seller has solely made a repair out there within the pre-release model 2.4.9-alpha3+.

Additionally, Adobe has not responded to our repeated requests for a touch upon the subject.

Web site homeowners/admins are suggested to use all out there mitigations and, if attainable, improve Magento to the most recent beta launch.

Automated pentesting proves the trail exists. BAS proves whether or not your controls cease it. Most groups run one with out the opposite.

This whitepaper maps six validation surfaces, exhibits the place protection ends, and gives practitioners with three diagnostic questions for any software analysis.

Related Articles

Latest Articles