• About
  • Advertise
  • Careers
  • Contact
Friday, March 24, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Data Breach

Tupperware site hacked with credit card skimmer

by Cyber360 News
March 26, 2020
in Data Breach
0
Tupperware site hacked with credit card skimmer
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Tupperware hasn’t yet put
a lid on a targeted cyberattack that uses a credit card skimmer to collect
customer payment information at checkout on the tupperware[.]com site and some
of its local sites.

The threat actors hid “malicious code within an image file that
activates a fraudulent payment form during the checkout process,” according to researchers
at Malwarebytes who discovered the compromise March 20. “This form collects
customer payment data via a digital credit card skimmer and passes it on to the
cybercriminals with Tupperware shoppers none-the-wiser.”

The Tupperware party long ago moved to the internet – with more
than one million people visiting the company’s website monthly. And as COVID-19
virus drives more people online to shop, the researchers wrote in a Wednesday
blog post
that “there is little doubt that a larger number of transactions will be
impacted by credit card skimmers,” one of the top web threats they monitor.

The
actors behind the Tupperware compromise put effort behind integrating the
skimmer seamlessly and remain undetected. Malwarebytes found the malicious
activity during a web crawl after coming across a suspicious iframe loaded from
deskofhelp[.]com when visiting the retailer’s checkout page and which displays
the payment form fields used by shoppers.   

The domain was registered on March 9 using an email address with
Russian provider Yandex and found alongside other phishing domains.

The hackers’ scheme weren’t meticulous, though. “The attackers didn’t carefully consider (or perhaps didn’t care about) how the malicious form should look on localized pages,” the researchers wrote, noting that while the Spanish version of the Tupperware site is written in Spanish, the rogue payment form remained in English.

Malwarebytes notified Tupperware of its findings but the skimmer was still active when the company published its findings today.

“Typically, when it comes to a website hack, an organization needs to react fast and either temporarily disable their site or quickly remove the offending code,” Jerome Segura, director of threat intelligence, Malwarebytes Labs told SC Media.

But the security challenge
doesn’t stop there. “Attackers can return hours later and place new code,” said
Segura.

Site owners should perform a full
security sweep to identify the root cause and tease out backdoors and other
artifacts. Breaches often occur because a vulnerability is left unpatched.  But “due to the nature of content management
systems and their plugins, the patching process is not always straightforward,”
said Segura.

“Most e-commerce companies should
have a security contact form or better, a security.txt file, on their site,” he
said. “This makes reporting breaches easier and ensures that the time to
remediate is as short as possible.”

Cyber360 News

Cyber360 News

Next Post
Security Firm Keepnet Labs Database Leaked 5 Billion Records Of Breached Data

Security Firm Keepnet Labs Database Leaked 5 Billion Records Of Breached Data

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In