Sunday, January 5, 2025
HomeCyber Security NewsHackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Published on

SIEM as a Service

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target e-commerce platforms during the holiday season, which allow attackers to craft convincing phishing emails, replicate legitimate websites, and gain unauthorized access to systems. 

The objective of cybercriminals is to steal sensitive information and financial data from shoppers who are unaware of their activity by taking advantage of vulnerabilities and taking advantage of user trust. 

They are taking advantage of generative AI, specifically models like ChatGPT, to create highly convincing phishing emails designed to mimic legitimate communications from retailers and banks. 

- Advertisement - SIEM as a Service

These sophisticated attacks, often themed around holidays or seasonal sales, aim to deceive unsuspecting shoppers into divulging sensitive information such as credit card details.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration 

It highlights the increasing use of sniffing tools, which allow cybercriminals to intercept and steal data during online transactions, further amplifying the threat landscape for online shoppers.

Collection of threats to shopping websites

Cybercriminals are exploiting the holiday shopping season by registering thousands of fake domains mimicking popular e-commerce brands to lure unsuspecting consumers with fraudulent offers. 

They are targeting vulnerable e-commerce platforms like Adobe Commerce, Shopify, and WooCommerce, exploiting weak configurations and outdated plugins. 

Attackers are employing various techniques, including sniffers to steal sensitive customer data and Remote Code Execution (RCE) exploits to gain unauthorized administrative access to these platforms, posing significant risks to both businesses and consumers.

Fake J. Crew shopping site

The darknet has become a thriving marketplace for cybercrime tools and stolen data. FortiGuard Labs has noted an increase in the sale of compromised e-commerce databases, stolen gift cards, and credit card information. 

Phishing kits are being sold at prices ranging from $100 to $1,000, depending on their sophistication and customization options, which enable even less experienced attackers to launch advanced phishing attacks. 

Other tools, such as sniffing and brute-forcing software, are also available on the darknet, further lowering the barrier of entry for cybercriminals.

Trafficker recruitment ad

Businesses today face a myriad of cyber threats, where phishing attacks, data breaches, and financial fraud are common occurrences, often resulting from compromised admin panels, outdated software, and weak security practices. 

Actors with malicious intent take advantage of these vulnerabilities in order to steal sensitive information, disrupt operations, and tarnish the reputation of the brand. 

Shoppers should prioritize online security by verifying URLs, using secure payment methods, avoiding public Wi-Fi, enabling multi-factor authentication, and regularly monitoring financial statements. 

While businesses must enhance their cybersecurity by updating platforms and plugins, conducting vulnerability scans, employing fraud detection tools, educating customers, monitoring domain registrations, and securing admin panels with strong passwords and restricted access.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...