A Magecart attack is one in which cybercriminals skim shoppers’ credit card data and other personally identifiable information (PII) from your online payment forms when they complete a transaction. The name “Magecart” refers to several hacker groups that use online skimming techniques to steal payment data from e-commerce sites on the Magento platform. However, Magecart attacks have spread far beyond Magento to OpenCart, Volusion and nearly every other e-commerce platform. This type of attack is known more broadly as digital skimming.
In a Magecart attack, cybercriminals may breach sites directly or attack your client-side supply chain. Most websites utilize third party apps — such as social sharing buttons, payment iframes, chatbots, analytics and metrics scripts, A/B testing scripts for experiments and helper libraries such as jQuery — to improve site functionality. If a cybercriminal infects a single code weakness into vendor code, it can spread to all of the sites that utilize the infected code. In other words, an infection in Magento or other third-party platforms is an infection in your payment form if you have integrated their client-side Javascript code onto your site.
Suffering a Magecart attack exposes payment data and PII, damages brand reputation and consumer trust, and results in fines due to noncompliance with privacy regulations. These attacks can be hard to detect, so it is critical to proactively identify and fix code risks before your site is compromised.