Thursday, March 13, 2025
HomeCyber Security NewsHackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target e-commerce platforms during the holiday season, which allow attackers to craft convincing phishing emails, replicate legitimate websites, and gain unauthorized access to systems. 

The objective of cybercriminals is to steal sensitive information and financial data from shoppers who are unaware of their activity by taking advantage of vulnerabilities and taking advantage of user trust. 

They are taking advantage of generative AI, specifically models like ChatGPT, to create highly convincing phishing emails designed to mimic legitimate communications from retailers and banks. 

These sophisticated attacks, often themed around holidays or seasonal sales, aim to deceive unsuspecting shoppers into divulging sensitive information such as credit card details.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration 

It highlights the increasing use of sniffing tools, which allow cybercriminals to intercept and steal data during online transactions, further amplifying the threat landscape for online shoppers.

Collection of threats to shopping websites

Cybercriminals are exploiting the holiday shopping season by registering thousands of fake domains mimicking popular e-commerce brands to lure unsuspecting consumers with fraudulent offers. 

They are targeting vulnerable e-commerce platforms like Adobe Commerce, Shopify, and WooCommerce, exploiting weak configurations and outdated plugins. 

Attackers are employing various techniques, including sniffers to steal sensitive customer data and Remote Code Execution (RCE) exploits to gain unauthorized administrative access to these platforms, posing significant risks to both businesses and consumers.

Fake J. Crew shopping site

The darknet has become a thriving marketplace for cybercrime tools and stolen data. FortiGuard Labs has noted an increase in the sale of compromised e-commerce databases, stolen gift cards, and credit card information. 

Phishing kits are being sold at prices ranging from $100 to $1,000, depending on their sophistication and customization options, which enable even less experienced attackers to launch advanced phishing attacks. 

Other tools, such as sniffing and brute-forcing software, are also available on the darknet, further lowering the barrier of entry for cybercriminals.

Trafficker recruitment ad

Businesses today face a myriad of cyber threats, where phishing attacks, data breaches, and financial fraud are common occurrences, often resulting from compromised admin panels, outdated software, and weak security practices. 

Actors with malicious intent take advantage of these vulnerabilities in order to steal sensitive information, disrupt operations, and tarnish the reputation of the brand. 

Shoppers should prioritize online security by verifying URLs, using secure payment methods, avoiding public Wi-Fi, enabling multi-factor authentication, and regularly monitoring financial statements. 

While businesses must enhance their cybersecurity by updating platforms and plugins, conducting vulnerability scans, employing fraud detection tools, educating customers, monitoring domain registrations, and securing admin panels with strong passwords and restricted access.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

Hackers Exploiting JSPSpy To Manage Malicious Webshell Networks

Cybersecurity researchers have recently identified a cluster of JSPSpy web shell servers featuring an...

North Korean Hackers Use Google Play Malware to Steal SMS, Calls & Screenshots

Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated Android surveillance tool dubbed...

Mozilla Issues Urgent Firefox Update Warning to Prevent Add-on Failures

Mozilla has issued an urgent warning to all Firefox users, emphasizing the need to...

Bitdefender Identifies Security Vulnerabilities Enabling Man-in-the-Middle Exploits

Cybersecurity firm Bitdefender has disclosed two high-severity security vulnerabilities affecting its legacy BOX v1...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting JSPSpy To Manage Malicious Webshell Networks

Cybersecurity researchers have recently identified a cluster of JSPSpy web shell servers featuring an...

North Korean Hackers Use Google Play Malware to Steal SMS, Calls & Screenshots

Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated Android surveillance tool dubbed...

Mozilla Issues Urgent Firefox Update Warning to Prevent Add-on Failures

Mozilla has issued an urgent warning to all Firefox users, emphasizing the need to...