From fd960bfc1b04b0c7092b453388c111aea52b7593 Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Tue, 18 Sep 2018 23:10:33 +0200 Subject: [PATCH] Add magentocore malware --- clusters/tool.json | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/clusters/tool.json b/clusters/tool.json index 950ef71..c6a7dc8 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -5744,7 +5744,17 @@ ] }, "uuid": "641464a6-b690-11e8-976e-bffc9a17c6a4" + }, + { + "value": "MagentoCore Malware", + "description":"A Dutch security researcher has lifted the veil on a massive website hacking campaign that has infected 7,339 Magento stores with a script that collects payment card data from people shopping on the sites.\nThe script is what industry experts call a \"payment card scraper\" or \"skimmer.\" Hackers breach sites and modify their source code to load the script along with its legitimate files.\nThe script usually loads on store checkout pages and secretly records payment card details entered in payment forms, data that it later sends to a server under the hacker's control.", + "meta": { + "refs": [ + "https://www.bleepingcomputer.com/news/security/magentocore-malware-found-on-7-339-magento-stores/" + ] + }, + "uuid": "df05f528-bb57-11e8-9fd4-8320e14151f2" } ], - "version": 87 + "version": 88 }