Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    These Bose earbuds are an easy pick over AirPods for me – why I don’t regret it

    October 16, 2025

    Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

    October 16, 2025

    Source code and vulnerability info stolen from F5 Networks

    October 16, 2025
    Facebook X (Twitter) Instagram
    Trending
    • These Bose earbuds are an easy pick over AirPods for me – why I don’t regret it
    • Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks
    • Source code and vulnerability info stolen from F5 Networks
    • Electric aircraft startup Beta Technologies seeks to raise $825M in IPO
    • Did you know that Windows 11 has an emergency shutdown feature? Here’s where to find it
    • This Thiel-backed venture allows doping in its own sports
    • 58% of CISOs are boosting AI security budgets
    • Enhanced Games founder on the controversial ‘future of sports’
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Guides»This fake checkout page looks real – until your card info is sent to hidden servers in plain sight
    Guides

    This fake checkout page looks real – until your card info is sent to hidden servers in plain sight

    TechurzBy TechurzJuly 19, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • OpenCart websites were silently injected with malware that mimics trusted tracking scripts
    • Script hides in analytics tags and quietly swaps real payment forms for fake ones
    • Obfuscated JavaScript allowed attackers to slip past detection and launch credential theft in real time

    A new Magecart-style attack has raised concerns across the cybersecurity landscape, targeting ecommerce websites which rely on the OpenCart CMS.

    The attackers injected malicious JavaScript into landing pages, cleverly hiding their payload among legitimate analytics and marketing tags such as Facebook Pixel, Meta Pixel, and Google Tag Manager.

    Exepers from c/side, a cybersecurity firm that monitors third-party scripts and web assets to detect and prevent client-side attacks, says the injected code resembles a standard tag snippet, but its behavior tells a different story.


    You may like

    Obfuscation techniques and script injection

    This particular campaign disguises its malicious intent by encoding payload URLs using Base64 and routing traffic through suspicious domains such as /tagscart.shop/cdn/analytics.min.js, making it harder to detect in transit.

    At first, it appears to be a standard Google Analytics or Tag Manager script, but closer inspection reveals otherwise.

    When decoded and executed, the script dynamically creates a new element, inserts it before existing scripts, and silently launches additional code.

    The malware then executes heavily obfuscated code, using techniques such as hexadecimal references, array recombination, and the eval() function for dynamic decoding.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The key function of this script is to inject a fake credit card form during checkout, styled to appear legitimate.

    Once rendered, the form captures input across the credit card number, expiration date, and CVC. Listeners are attached to blur, keydown, and paste events, ensuring that user input is captured at every stage.

    Importantly, the attack doesn’t rely on clipboard scraping, and users are forced to manually input card details.

    After this, data is immediately exfiltrated via POST requests to two command-and-control (C2) domains: //ultracart[.]shop/g.php and //hxjet.pics/g.php.

    In an added twist, the original payment form is hidden once the card information is submitted – a second page then prompts users to enter further bank transaction details, compounding the threat.

    What stands out in this case is the unusually long delay in using the stolen card data, which took several months instead of the typical few days.

    The report reveals that one card was used on June 18 in a pay-by-phone transaction from the US, while another was charged €47.80 to an unidentified vendor.

    This breach shows a growing risk in SaaS-based e-commerce, where CMS platforms like OpenCart become soft targets for advanced malware.

    There is therefore a need for stronger security measures beyond basic firewalls.

    Automated platforms like c/side claim to detect threats by spotting obfuscated JavaScript, unauthorized form injections, and anomalous script behavior.

    As attackers evolve, even small CMS deployments must remain vigilant, and real-time monitoring and threat intelligence should no longer be optional for e-commerce vendors seeking to secure their customers’ trust.

    You might also like

    card checkout Fake hidden Info page Plain Real servers sight
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAstronomer CEO resigns following Coldplay concert scandal
    Next Article Best Mac games 2025: A-list games to play on your Mac
    Techurz
    • Website

    Related Posts

    Security

    Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

    October 16, 2025
    Security

    Source code and vulnerability info stolen from F5 Networks

    October 16, 2025
    Security

    AI red flags, ethics boards and the real threat of AGI today

    October 14, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    These Bose earbuds are an easy pick over AirPods for me – why I don’t regret it

    October 16, 2025

    Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

    October 16, 2025

    Source code and vulnerability info stolen from F5 Networks

    October 16, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.