• OpenCart websites were silently injected with malware that mimics trusted tracking scripts
  • Script hides in analytics tags and quietly swaps real payment forms for fake ones
  • Obfuscated JavaScript allowed attackers to slip past detection and launch credential theft in real time

A new Magecart-style attack has raised concerns across the cybersecurity landscape, targeting ecommerce websites which rely on the OpenCart CMS.

The attackers injected malicious JavaScript into landing pages, cleverly hiding their payload among legitimate analytics and marketing tags such as Facebook Pixel, Meta Pixel, and Google Tag Manager.



Source link


Leave a Reply

Your email address will not be published. Required fields are marked *