This false payment page seems real – until your card information is sent to servers hidden at sight


  • OpenCart websites have been injected in silence with malicious software that imitates confidence monitoring scripts
  • The script is hidden in the analysis tags and quietly exchange real payment forms for false
  • Dark JavaScript

A new MageCart style attack has raised concerns in the cybersecurity landscape, targeting the electronic commerce websites that are based on the OpenCart CMS.

The attackers injected malicious javascript into destination pages, intelligently hiding their payload among the legitimate analysis and marketing tags such as Facebook Pixel, Meta Pixel and Google Tag Manager.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top