Categories: Data Breach News InfoSec News

Segway website hacked and infected with payment card skimmer

Published by
RiSec.n0tst3

Hackers have breached the Segway website and placed malicious code on its online store to collect payment card details from online shoppers.

“The website was compromised at least since January 6th,” antivirus maker Malwarebytes said on Monday.

The security firm said the attack was still ongoing at the time it published its blog post and security alert.

A spokesperson from Segway did not return a request for comment, but an inspection of the store’s source code suggests the company has removed the malicious code.

Segway website hacked and malicous codea added

In a technical report on Monday, Malwarebytes said the attackers breached Segway’s Magento-based online store and then added a piece of JavaScript to the site that loaded malicious code from the booctstrap[.]com domain.

This code would activate when users would visit the store’s checkout page, collect information entered in the payment form, and send the data to a remote server.

The Malwarebytes Threat Intelligence Team said they linked the code to a threat actor known as Magecart Group 12.

Active since September 2018, this threat actor has been linked to several security incidents, including the compromise of Adverline, a French advertising agency, from where it used its ads to place card-stealing code on hundreds of other sites and the hack of re-seller of tickets for the Tokyo Olympics.

Based on its telemetry data, Malwarebytes said that most users who visited the compromised Segway site during the past three weeks were based in Australia and the US.

You may also enjoy reading, Assange Wins First Stage in Effort to Appeal US Extradition

source

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Bookmark
Please login to bookmark Close
Social Comments Box
Connect
Share the word, let's increase Cybersecurity Awareness as we know it

This post was last modified on 26 January 2022 4:48 PM

RiSec.n0tst3

Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK. I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated... I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK. I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!

Leave a Comment
Published by
RiSec.n0tst3
Tags: breached cyber security cybersecurity cybersecurity news datasecurity hackers infosec infosecurity javascript Malicous code malwarebytes segway segway hacked store

Recent Posts

  • Data Breach News
  • InfoSec News

WH Smith Announces Cyber-Attack: Employee Data Stolen

British high street chain WH Smith has recently revealed that it was hit by a…

2 years ago
  • InfoSec News
  • World Affairs

Voice ID: How Secure is it Really?

As banks worldwide roll out Voice ID as a means of user authentication over the…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

What distinguishes Application Security from API Security?

In the era of digital transformation, cybersecurity has become a major concern for businesses. When…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

The Top 5 Cybersecurity threats facing Businesses Today

In today's digital age, cybersecurity threats have become a significant concern for businesses of all…

2 years ago
  • InfoSec News
  • World Affairs

Enterprise users infected by RIG Exploit Kit thanks to Internet Explorer

The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…

2 years ago
  • Cybersecurity Academy

The Rise and Rise of AI

One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…

2 years ago