New Magecart Network Uncovered: Disrupting Online Shoppers Worldwide
A new Magecart network has been uncovered, targeting major payment networks including American Express, Diners Club, Discover, and Mastercard. The campaign, active since January 2022, uses web-skimming techniques to steal credit card information from online shoppers. The attackers inject malicious JavaScript code into compromised e-commerce websites, creating fake payment forms that capture and exfiltrate sensitive data. The skimmer employs sophisticated obfuscation techniques and mimics legitimate payment processes to avoid detection. Victims are unaware of the theft, as the malware allows the real transaction to proceed after capturing the data. The campaign demonstrates advanced knowledge of e-commerce platforms and continues to pose a significant threat to online retailers and consumers worldwide.
AI Analysis
Technical Summary
This newly uncovered Magecart network represents a sophisticated web-skimming campaign targeting major payment card brands including American Express, Diners Club, Discover, and Mastercard. Since January 2022, attackers have compromised e-commerce websites by injecting malicious JavaScript code that creates fake payment forms. These forms capture sensitive credit card information entered by online shoppers and exfiltrate it to attacker-controlled infrastructure, such as domains like cdn-cookie.com. The malware employs advanced obfuscation and mimics legitimate payment workflows to evade detection by security tools and users alike. Importantly, the skimmer allows the real transaction to complete successfully, so victims remain unaware of the data theft. The campaign demonstrates deep knowledge of e-commerce platforms and payment processing, indicating a well-resourced adversary. Although no CVE or known exploits in the wild are currently documented, the threat persists globally and continues to evolve. Indicators of compromise include specific malicious URLs and domains used for hosting the skimmer scripts. The attack leverages techniques such as JavaScript injection (T1059.007), obfuscation (T1027), and data exfiltration over web protocols (T1071.001). This campaign poses a direct threat to online retailers, payment processors, and consumers by facilitating credit card theft and subsequent payment fraud.
Potential Impact
For European organizations, this Magecart campaign threatens the confidentiality of customer payment data, potentially leading to large-scale credit card fraud and financial losses. Retailers and payment processors in Europe could suffer reputational damage, regulatory penalties under GDPR for failing to protect personal data, and operational disruptions due to incident response efforts. The theft of payment information undermines consumer trust in e-commerce platforms, which is critical in the European market where online shopping is widespread. Additionally, compromised merchants may face chargebacks and increased fraud monitoring costs. The campaign’s stealthy nature complicates detection and mitigation, increasing the risk of prolonged data exposure. Given the prominence of European payment networks and the volume of online transactions, the threat could have broad financial and legal implications across the region.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to combat Magecart-style web-skimming attacks. Specific measures include: 1) Conducting thorough code audits and integrity checks on all e-commerce web pages, especially payment forms, to detect unauthorized JavaScript injections. 2) Employing Content Security Policy (CSP) headers to restrict loading of scripts only from trusted domains and blocking inline scripts. 3) Using Subresource Integrity (SRI) to ensure externally loaded scripts have not been tampered with. 4) Monitoring network traffic for suspicious connections to known malicious domains such as cdn-cookie.com. 5) Implementing runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting Magecart behaviors. 6) Regularly scanning for indicators of compromise (IOCs) including the listed malicious URLs and domains. 7) Educating development and security teams on Magecart tactics and ensuring timely patching of e-commerce platform vulnerabilities. 8) Collaborating with payment processors to monitor for unusual transaction patterns indicative of skimming. 9) Employing anomaly detection on client-side behavior to identify injected scripts. 10) Ensuring incident response plans include Magecart-specific scenarios to enable rapid containment and remediation.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
Indicators of Compromise
- url: http://cdn-cookie.com/recorder.js
- domain: cdn-cookie.com
- domain: colunexshop.com
- domain: lasorie.com
- domain: www.cdn-cookie.com
New Magecart Network Uncovered: Disrupting Online Shoppers Worldwide
Description
A new Magecart network has been uncovered, targeting major payment networks including American Express, Diners Club, Discover, and Mastercard. The campaign, active since January 2022, uses web-skimming techniques to steal credit card information from online shoppers. The attackers inject malicious JavaScript code into compromised e-commerce websites, creating fake payment forms that capture and exfiltrate sensitive data. The skimmer employs sophisticated obfuscation techniques and mimics legitimate payment processes to avoid detection. Victims are unaware of the theft, as the malware allows the real transaction to proceed after capturing the data. The campaign demonstrates advanced knowledge of e-commerce platforms and continues to pose a significant threat to online retailers and consumers worldwide.
AI-Powered Analysis
Technical Analysis
This newly uncovered Magecart network represents a sophisticated web-skimming campaign targeting major payment card brands including American Express, Diners Club, Discover, and Mastercard. Since January 2022, attackers have compromised e-commerce websites by injecting malicious JavaScript code that creates fake payment forms. These forms capture sensitive credit card information entered by online shoppers and exfiltrate it to attacker-controlled infrastructure, such as domains like cdn-cookie.com. The malware employs advanced obfuscation and mimics legitimate payment workflows to evade detection by security tools and users alike. Importantly, the skimmer allows the real transaction to complete successfully, so victims remain unaware of the data theft. The campaign demonstrates deep knowledge of e-commerce platforms and payment processing, indicating a well-resourced adversary. Although no CVE or known exploits in the wild are currently documented, the threat persists globally and continues to evolve. Indicators of compromise include specific malicious URLs and domains used for hosting the skimmer scripts. The attack leverages techniques such as JavaScript injection (T1059.007), obfuscation (T1027), and data exfiltration over web protocols (T1071.001). This campaign poses a direct threat to online retailers, payment processors, and consumers by facilitating credit card theft and subsequent payment fraud.
Potential Impact
For European organizations, this Magecart campaign threatens the confidentiality of customer payment data, potentially leading to large-scale credit card fraud and financial losses. Retailers and payment processors in Europe could suffer reputational damage, regulatory penalties under GDPR for failing to protect personal data, and operational disruptions due to incident response efforts. The theft of payment information undermines consumer trust in e-commerce platforms, which is critical in the European market where online shopping is widespread. Additionally, compromised merchants may face chargebacks and increased fraud monitoring costs. The campaign’s stealthy nature complicates detection and mitigation, increasing the risk of prolonged data exposure. Given the prominence of European payment networks and the volume of online transactions, the threat could have broad financial and legal implications across the region.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to combat Magecart-style web-skimming attacks. Specific measures include: 1) Conducting thorough code audits and integrity checks on all e-commerce web pages, especially payment forms, to detect unauthorized JavaScript injections. 2) Employing Content Security Policy (CSP) headers to restrict loading of scripts only from trusted domains and blocking inline scripts. 3) Using Subresource Integrity (SRI) to ensure externally loaded scripts have not been tampered with. 4) Monitoring network traffic for suspicious connections to known malicious domains such as cdn-cookie.com. 5) Implementing runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting Magecart behaviors. 6) Regularly scanning for indicators of compromise (IOCs) including the listed malicious URLs and domains. 7) Educating development and security teams on Magecart tactics and ensuring timely patching of e-commerce platform vulnerabilities. 8) Collaborating with payment processors to monitor for unusual transaction patterns indicative of skimming. 9) Employing anomaly detection on client-side behavior to identify injected scripts. 10) Ensuring incident response plans include Magecart-specific scenarios to enable rapid containment and remediation.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.silentpush.com/blog/magecart"]
- Adversary
- Magecart
- Pulse Id
- 69669ed85739c5f6675d3cbd
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://cdn-cookie.com/recorder.js | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincdn-cookie.com | — | |
domaincolunexshop.com | — | |
domainlasorie.com | — | |
domainwww.cdn-cookie.com | — |
Threat ID: 696777e78330e06716d549fb
Added to database: 1/14/2026, 11:03:03 AM
Last enriched: 1/14/2026, 11:17:02 AM
Last updated: 1/14/2026, 3:27:55 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployments
MediumAnalyzing a Multi-Stage AsyncRAT Campaign via Managed Detection and Response
MediumReflecting on AI in 2025: Faster Attacks, Same Old Tradecraft
MediumThe Cloud-Native Malware Framework
MediumYet Another Leak of China's Contractor-Driven Cyber-Espionage Ecosystem
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.