MageCart Group which is a syndicate of malicious actors is reported to have launched a cyberattack on the website of the NutriBullet, in an attempt to siphon payment card details from the customers shopping on the website.
Going by the details, the malicious group which is in the discussion is being called Magecart Group 8 which reportedly inserted a malicious code on the website of the blender retailer on Feb 20th,2020. The objective of the attack was to target customers while they are inserting payment card details on the checkout page.
Cybersecurity Insiders has learned that the discovery of the cyber incident was made by Yonathan Klijnsma, a threat researcher from RiskIQ who alerted the authorities of NutriBullet on an immediate note.
NutriBullet has made it official that the malicious code was removed from the website by March 17th and now the situation is said to be under control.
A detailed investigation was launched to determine how the threat actors managed to insert the code into the website. Also, the IT staff have updated their security policies and credentials with Multi-factor authentication to see that no such incident occurs in the future.
Note 1- Hackers are seen targeting shopping carts from the past two years as they use skimmers that are designed to steal data entered into the payment web pages of various e-commerce websites.
Note 2- Historically speaking, the list of Magecart victims include Ticketmaster’s UK Operations in Jan’18; British Airways in Aug’18; NewEgg Electronics Retailer in Sept’18; Shopper Approved in Sept’18; Topps Sports Collectible website in Nov’18; Atlanta Hawks in April’18; Forbes Magazine subscribers in May’19; and on the chain of College Campus Bookstores in April ‘19.