Categories: Cybersecurity

Hackers hide credit card stealing scripts in favicon EXIF data

Hackers are always evolving their tactics to stay one step ahead of security companies. A perfect example of this is the hiding of malicious credit card stealing scripts in the EXIF data of a favicon image to evade detection.

A common attack used to steal credit cards is to hack the website and inject malicious JavaScript scripts that steal submitted payment information when a customer makes a purchase.

These stolen credit cards are then sent back to a server under the control of the threat actors where they are collected and used for fraudulent purchases or to sell on dark web criminal markets.

These types of attacks are called Magecart and have been used on websites for well-known companies such as Claire’s, TupperwareSmith & Wesson, Macy’s, and British Airways.

Continually evolving to better steal your credit cards

In a new report by Malwarebytes, an online store using the WordPress WooCommerce plugin was found to be infected with a Magecart script to steal customer’s credit cards.

What made this attack stand out was that the scripts used to capture data from payment forms were not added directly to the site but were contained in the EXIF data for a remote site’s favicon image.

« The abuse of image headers to hide malicious code is not new, but this is the first time we witnessed it with a credit card skimmer, » Malwarebytes’ Jérôme Segura stated in the report.

When images are created, the developer can embed information such as the artist who created it, information about the camera, copyright info, and even the location of the picture.

This information is called the Exchangeable Image File Format (EXIF) data.

In this attack, the threat actors hacked a website and added what appears to be a simple script that inserts a remote favicon image and does some processing.

After further investigation, Malwarebytes discovered that this favicon, while appearing harmless, actually contained malicious JavaScript scripts embedded in its EXIF data, as shown in the image below.

Source : Hackers hide credit card stealing scripts in favicon EXIF data

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Panorama des menaces cyber en 2025

Panorama des menaces cyber en 2025 : Implications pour les entreprises françaises à l'ère de…

14 heures ago

Risques émergents de l’Intelligence Artificielle

Introduction L'adoption croissante des technologies d'intelligence artificielle dans le secteur de la santé offre des…

2 jours ago

Cybersécurité et IA en santé : enjeux stratégiques pour les DSI d’établissements de soins

La révolution IA dans le secteur de la santé : nouveaux défis de cybersécurité La…

2 jours ago

Sécurité des PME : échapper à l’enfer des questionnaires de sécurité

En tant que PME sous-traitante de grands groupes, vous connaissez trop bien ce scénario :…

5 jours ago

Votre entreprise a été cyberattaquée : pourquoi la technologie seule ne vous sauvera pas

Votre entreprise vient de subir une cyberattaque. Dans le feu de l'action, vous avez mobilisé…

5 jours ago

Mieux connaitre vos faiblesses pour mieux vous protéger

"Mais concrètement, à quoi sert un scanner de vulnérabilité pour une entreprise comme la nôtre?"…

5 jours ago

This website uses cookies.