Original Release Date: 7/15/2019
A new Magecart payment card-skimming campaign breached approximately 960 e-commerce stores running on Magento CMS. This is the largest number of breaches in a 24-hour period and includes enterprise store sites. According to researcher Willem de Groot of Sanguine Security, the threat actor inserted a fake credit card payment section by injecting a customized Javascript, exploiting a vulnerability or previously compromised software. This campaign is believed to be highly automated as victimization is worldwide and random. Compromised information includes complete payment card data, names, addresses, and phone numbers. For more information regarding this breach, review the Bleeping Computer article.