The ongoing Magecart campaign has attracted the attention of cybersecurity researchers for leveraging realistic-looking fake payment screens to capture sensitive data entered by unsuspecting users. The cyber threat actor used original logos from the compromised store and customized a web element known as a modal to hijack the checkout page perfectly. Interestingly, the “skimmer” page looks more authentic than the original payment page. It must be the improved graphics.[1]
The term Magecart is