Tuesday, April 29, 2025
HomeComputer SecurityMagecart Hackers Group Attack High-grade Wi-Fi Routers To Take Control The Public-WiFi...

Magecart Hackers Group Attack High-grade Wi-Fi Routers To Take Control The Public-WiFi Networks

Published on

SIEM as a Service

Follow Us on Google News

A financially motivated hacking group called ” Magecart Group 5 (MG5) “targeting high-end commercial-grade layer 7 (L7) WiFi routers and take taking control over the public Wi-Fi networks that deployed in airports, casinos, hotels, and resorts.

Threat actors initiate the attack by injecting malicious code into the legitimate Javascript file that loaded by the layer 7 (L7) routers.

Magecart Group 5 group name has been derived since the attackers used a modus operandi with 38 different cybercrime factions that they used to attack E-commerce sites that includes hacking carts, checkout pages or web logic and more.

- Advertisement - Google News

Earlier this Year, MG5 threat group have been already involved with attacking hundreds of E-commerce Websites Injecting with Skimming Code That Steals Payment card Data.

Wi-Fi Routers

Researchers found that additionally, attackers were injecting malicious payment card stealing code into a popular open-source JavaScript library, a free library to help e-commerce websites to be compatible with mobile browsers.

This technique allows attackers to infect the mobile devices to gain access and take control over the application running on the compromised mobile.

Attack Commercial-Grade, L7 WiFi Routers

Threat actors specifically target and infect the code in Wi-Fi routers that provide commercial Wi-Fi service in public areas such as hotels or Airports.

Commercial-class layer 7 routers integrate by both routing and switching capabilities and reside in the same virtualization server as other business-critical IT infrastructure components that allows an attacker to take control of the other part of the network.

According to IBM research, ” popular routers in this category can also present risky features when it comes to information security — content filtering, redirection to interstitial pages, payload rewriting and traffic shaping are just a few of those features.”

Once the attackers compromised the web resources that an L7 router loads, they can abuse this feature and use it against the user and attack their Wi-Fi connected devices.

Wi-Fi Attack Scenario

Generally, WiFi service vendor who offers WiFi to the hotel won’t support the proxying adverts or JavaScript injection.

But when we are staying in a hotel, we are often getting ads in our devices when we connect via captive ports because WiFi vendors offer a discounted price to the hotel for the Wi-Fi operation and prompt them to allows midstream ads to run before guests connect to generate extra revenue from 3 rd parties.

But the hotel operators doesn’t know that potential hacker groups such as MG5 could be taking advantage of a massive number of captive users and infect the Ads, JavaScript injections and ultimately steal financial data but the users will never find how they lost their information or money.

Attackers also can steal the payment data when users browser using Wi-Fi connection from the compromised computer and also inject malicious ads.

” Having access to a large number of captive users with very high turnover — such as in the case of airports and hotels — is a lucrative concept for attackers looking to compromise payment data.” Researched said.

You can read here the about How To Secure Wi-Fi Networks Effectively From Hackers – A Complete Guide.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read: 10 Best WiFi Hacking Apps for Android – 2019 Edition

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...

Europol Launches Taskforce to Combat Violence-as-a-Service Networks

Europol has announced the launch of a powerful new Operational Taskforce (OTF), codenamed GRIMM, to...

JokerOTP Platform Linked to 28,000+ Phishing Attacks Dismantled

Law enforcement agencies from the UK and the Netherlands have dismantled the notorious JokerOTP...

Windows Server 2025 Gets Hotpatching Support Beginning July 1, 2025

Microsoft announced that hotpatching support for Windows Server 2025 will become generally available as...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...

Europol Launches Taskforce to Combat Violence-as-a-Service Networks

Europol has announced the launch of a powerful new Operational Taskforce (OTF), codenamed GRIMM, to...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...