Magecart attackers have been collecting sensitive information from thousands of online stores after compromising top eCommerce platform and payment service provider Volusion.
Since September 7, hackers have activated online credit card skimmers on 3,126 online shops hosted by Volusion. That's according to Trend Micro security researchers' latest report.
One of the websites affected is the Sesame Street Live online store.
The code was designed to copy the personal information and credit card details submitted by users and send all the data to an exfiltration server. The code is very simple, intended to make it hard to spot, and the exfiltration server (“volusion-cdn[.]com”) is similar to a Volusion domain.
Researchers at Trend Micro believe the attack was orchestrated by Magecart Group 6, previously known as FIN6.
Security researchers claim the hackers carefully integrated the code into the original script, ensuring it's part of the execution flow of the program.
Trend Micro also recently released a report detailing a series of security incidents that happened last month where the booking sites belonging to two popular hotel chains were hit by Magecart malware.
Running an e-commerce site comes with responsibilities, especially when confidential payment card information is involved. Every company dealing with payment card transactions must comply with the PCI DSS Compliance Standard, which requires protections like intrusion protection systems and understanding the requirements and responsibilities of the merchant.
Unfortunately, outsourcing the workload and the risk of processing eCommerce transactions to third-parties will only make this process more complicated, as the security of those transactions becomes out of your control and put onto providers to Volusion.