Close Menu
TechurzTechurz
    What's Hot

    This young startup is taking on a fragrance industry that hasn’t changed in a almost half century

    May 21, 2026

    Maka Kids is redefining kids’ screen time with a streaming app optimized for well-being, not engagement

    May 21, 2026

    Beauty booking startup Fresha hits $1 billion valuation with KKR backing

    May 21, 2026
    Facebook X (Twitter) Instagram
    Tech Pulse
    • This young startup is taking on a fragrance industry that hasn’t changed in a almost half century
    • Maka Kids is redefining kids’ screen time with a streaming app optimized for well-being, not engagement
    • Beauty booking startup Fresha hits $1 billion valuation with KKR backing
    • General Catalyst just led a $63M bet on India’s travel payments market
    • Clouted wants to take the guesswork out of making short videos go viral
    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    TechurzTechurz
    • Home
    • Tech Pulse
    • Future Tech
    • AI Systems
    • Cyber Reality
    • Disruption Lab
    • Signals
    TechurzTechurz
    Home - Guides - This fake checkout page looks real – until your card info is sent to hidden servers in plain sight
    Guides

    This fake checkout page looks real – until your card info is sent to hidden servers in plain sight

    TechurzBy TechurzJuly 19, 2025Updated:May 12, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • OpenCart websites were silently injected with malware that mimics trusted tracking scripts
    • Script hides in analytics tags and quietly swaps real payment forms for fake ones
    • Obfuscated JavaScript allowed attackers to slip past detection and launch credential theft in real time

    A new Magecart-style attack has raised concerns across the cybersecurity landscape, targeting ecommerce websites which rely on the OpenCart CMS.

    The attackers injected malicious JavaScript into landing pages, cleverly hiding their payload among legitimate analytics and marketing tags such as Facebook Pixel, Meta Pixel, and Google Tag Manager.

    Exepers from c/side, a cybersecurity firm that monitors third-party scripts and web assets to detect and prevent client-side attacks, says the injected code resembles a standard tag snippet, but its behavior tells a different story.


    You may like

    Obfuscation techniques and script injection

    This particular campaign disguises its malicious intent by encoding payload URLs using Base64 and routing traffic through suspicious domains such as /tagscart.shop/cdn/analytics.min.js, making it harder to detect in transit.

    At first, it appears to be a standard Google Analytics or Tag Manager script, but closer inspection reveals otherwise.

    When decoded and executed, the script dynamically creates a new element, inserts it before existing scripts, and silently launches additional code.

    The malware then executes heavily obfuscated code, using techniques such as hexadecimal references, array recombination, and the eval() function for dynamic decoding.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The key function of this script is to inject a fake credit card form during checkout, styled to appear legitimate.

    Once rendered, the form captures input across the credit card number, expiration date, and CVC. Listeners are attached to blur, keydown, and paste events, ensuring that user input is captured at every stage.

    Importantly, the attack doesn’t rely on clipboard scraping, and users are forced to manually input card details.

    After this, data is immediately exfiltrated via POST requests to two command-and-control (C2) domains: //ultracart[.]shop/g.php and //hxjet.pics/g.php.

    In an added twist, the original payment form is hidden once the card information is submitted – a second page then prompts users to enter further bank transaction details, compounding the threat.

    What stands out in this case is the unusually long delay in using the stolen card data, which took several months instead of the typical few days.

    The report reveals that one card was used on June 18 in a pay-by-phone transaction from the US, while another was charged €47.80 to an unidentified vendor.

    This breach shows a growing risk in SaaS-based e-commerce, where CMS platforms like OpenCart become soft targets for advanced malware.

    There is therefore a need for stronger security measures beyond basic firewalls.

    Automated platforms like c/side claim to detect threats by spotting obfuscated JavaScript, unauthorized form injections, and anomalous script behavior.

    As attackers evolve, even small CMS deployments must remain vigilant, and real-time monitoring and threat intelligence should no longer be optional for e-commerce vendors seeking to secure their customers’ trust.

    You might also like

    card checkout Fake hidden Info page Plain Real servers sight
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAstronomer CEO resigns following Coldplay concert scandal
    Next Article Best Mac games 2025: A-list games to play on your Mac
    Techurz
    • Website

    Related Posts

    Opinion

    Delve whistleblower strikes again, with alleged receipts about ‘fake compliance’

    March 31, 2026
    Opinion

    Insight Partners scrubs investment post about Delve amid ‘fake compliance’ allegations

    March 24, 2026
    Opinion

    Delve halts demos, Insight Partners scrubs investment post amid ‘fake compliance’ allegations

    March 24, 2026
    Add A Comment
    Latest Tech Pulse

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    AI is becoming introspective – and that ‘should be monitored carefully,’ warns Anthropic

    November 3, 202512 Views
    Stay In Touch
    • YouTube
    • WhatsApp
    • Twitter
    • Pinterest
    • LinkedIn

    Techurz helps readers stay ahead of digital change with clear, practical, future-focused technology intelligence - written today, searched tomorrow.

    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    Company
    • About Us
    • Contact Us
    • Our Authors / Editorial Team
    • Write For Us
    • Advertise
    Policy
    • Editorial Policy
    • Privacy Policy
    • Terms and Conditions
    • Affiliate Disclosure
    • Cookie Policy
    • Disclaimer
    • DMCA
    Explore
    • AI Systems
    • Cyber Reality
    • Future Tech
    • Disruption Lab
    • Signals
    • Tech Pulse
    • Sitemap

    Join the Techurz Brief

    The future does not arrive suddenly.
    Stay ahead with fast, sharp tech signals.

    Type above and press Enter to search. Press Esc to cancel.