Security Experts:

Connect with us

Hi, what are you looking for?



Magecart Skimming Attack Hits Hundreds of Campus e-Commerce Sites

Magecart is a prolific stealer of bank card details. It is neither a malware type nor an attacker group — it is more like a skimming attack style. Around a dozen different bad actors have already been discovered using Magecart — and now there is a new one reported Friday: Mirrorthief.

Magecart is a prolific stealer of bank card details. It is neither a malware type nor an attacker group — it is more like a skimming attack style. Around a dozen different bad actors have already been discovered using Magecart — and now there is a new one reported Friday: Mirrorthief.

Mirrorthief was discovered by Trend Micro, who detected attacks starting on April 14 against multiple campus store websites in the U.S. and Canada. The target websites are injected with a malicious skimming script that Trend has named JS.Mirrorthief.AA. The script scrapes payment card and personal details that are entered on the website’s payment page in a manner similar to the earlier Magecart attack against TicketMaster in June 2018.

In the TicketMaster attack, the attackers first compromised the software supplier Inbenta, injected the malware into a supplied script, and got downloaded onto the TicketMaster server. While the latest attack has similarities to this and other Magecart attacks, it is identical to none — and has been given the new name of Mirrorthief.

In this latest attack, the hackers first compromised the eCommerce platform PrismWeb which serves college stores owned by PrismRBS. The skimming script was injected into the JavaScript libraries used by the college stores, and consequently to the individual stores. Trend Micro has determined that 201 campus book and merchandise stores serving 176 colleges and universities in the U.S. and 21 in Canada loaded the malicious script.

Trend reported its findings to PrismRBS, who emailed a statement to SecurityWeek. “Upon learning of this incident, we immediately took action to halt the current attack, initiated an investigation, engaged an external IT forensic firm to assist in our review, notified law enforcement and payment card companies. Our investigation is ongoing…” Neither PrismRBS nor Trend Micro are yet aware of how much payment information was stolen.

The statement continues, “Based on our review to date, we have determined that an unauthorized party was able to install malicious software designed to capture payment card information on some of our customers’ e-commerce websites.”

In this latest attack, the hackers’ script was injected into the PrismWeb JavaScript payment checkout libraries. The script forged the Google Analytics script with a different script loaded from the attackers’ server. This is the primary script that steals the payment information. It is designed for and specifically targeted at PrismWeb.

The data it steals includes card number, expiry date, card type, card verification number (CVN), and the cardholder’s name, together with personal information such as addresses and phone numbers for billing. When the user finishes the websites payment form and clicks payment review, the skimmer steals the data, stores it in JSON format, and encrypts it with AES encryption and Base64 encoding. This is then exfiltrated as an HTML image element that connects to the attackers’ URL appended with the encrypted payment information as a query string. The server receives the data and returns a 1-pixel PNG image.

Disguising themselves as Google Analytics (the malicious domain is also similar to the original Google Analytics domain) is not unique. Other aspects are unique. “When we checked Mirrorthief’s network infrastructure, we found that it did not have any overlap with any known cybercrime groups. In addition, the skimmer Mirrorthief used in the attack is very different from the others since its specially designed to skim PrismWebís payment form. It sends the skimmed data through a unique JSON schema, which may hint that they use a unique backend data receiver instead of popular skimming kits.”

It seems that the world has yet another Magecart group to contend with.

Related: British Airways, Another Victim of Ongoing Magecart Attacks 

Related: New Magecart Group Targets French Ad Agency 

Related: Magecart Hackers Change Tactics Following Public Exposure 

Related: Ticketmaster Breach: Tip of the Iceberg in Major Ongoing Magecart Attacks 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...