Cyber Security News

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an outdated version 1.9.2.4.

This version, unsupported by Adobe since June 2020, left the site vulnerable due to unpatched security flaws.

The malware employed a deceptive .gif file, tampered browser sessionStorage data, and a malicious reverse proxy server to steal credit card details, login credentials, cookies, and other sensitive information.

The attack, which disrupted the site’s checkout process by preventing proper card input and order completion, highlights the critical risks of neglecting software updates on complex platforms like Magento, where migration to newer versions such as Magento 2 can be both costly and time-intensive.

Intricate Attack Mechanism: Fake GIFs and Reverse Proxy Tactics

The infection began with suspicious JavaScript code embedded between seemingly legitimate Bing UET tracking tags on the checkout page.

Closer inspection revealed a hidden reference to a Magento directory path, dynamically constructed via obfuscated string manipulation (e.g., concatenating “rep” and “lace” while ignoring decoy terms like “bing”).

This led to a bogus file path, “/media/magentothem/img/line.gif,” which, instead of an image, contained a malicious PHP script.

malicious PHP script

Decoding its obfuscated “backend_url” pointed to a remote server (217.12.207.38) orchestrating a reverse proxy.

Unlike a regular proxy or VPN that masks user identity, this reverse proxy intercepted and tampered with all site traffic-capturing headers, POST data, cookies, and session tokens-while rewriting responses to mimic legitimate domain interactions.

This made the interception nearly invisible to users and admins alike, with tampered Location headers and cookies ensuring the backend server’s identity remained hidden.

Additionally, a secondary injection in the checkout template file (onestepcheckout.phtml) used a user-specific key derived from the browser’s userAgent string to trigger client-side payloads via sessionStorage, executing card theft discreetly during checkout without leaving persistent traces post-session.

Urgent Call for Security and Mitigation Measures

According to Sucuri Report, this MageCart-style attack underscores the persistent threat to eCommerce platforms, particularly those on deprecated systems like Magento 1.

The malware’s multi-layered approach, combining server-side reverse proxy interception with client-side sessionStorage exploitation, demonstrates the advanced planning of threat actors.

Reverse proxy

For website administrators, the incident is a stark reminder to prioritize core updates and security patches, migrate to supported platforms like Magento 2, and deploy Web Application Firewalls (WAFs) to thwart such attacks.

Small business owners lacking technical expertise are urged to hire security professionals to safeguard customer trust and avoid penalties from payment processors like Visa for being identified as common points of purchase compromise.

For shoppers, vigilance is key-tools like Sitecheck can reveal outdated platforms, while browser security plugins and script blockers offer added protection against malicious JavaScript.

Ultimately, this case serves as a critical warning: neglecting eCommerce security not only jeopardizes customer data but also risks severe reputational and financial damage in an era of increasingly sophisticated cyber threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands, Germany,…

24 minutes ago

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow unauthorized…

2 hours ago

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical zero-day…

2 hours ago

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated SIM…

2 hours ago

Investigating Cobalt Strike Beacons Using Shodan: A Researcher’s Guide

Security researcher has revealed a robust method for gathering threat intelligence on Cobalt Strike beacons…

2 hours ago

Volkswagen Car Hack Exposes Owner’s Personal Data and Service Records

Tech-savvy Volkswagen owner has uncovered critical security flaws in the My Volkswagen app that potentially…

2 hours ago