CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Magecart skimmer leverages favicon EXIF steganography in web supply chain attack chain

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A recently observed Magecart skimmer employs a three-stage loader chain that conceals its malicious payload within the EXIF metadata of a dynamically loaded favicon, executing entirely in the browser during checkout without ever residing in the merchant’s source code or repository. The attack abuses third-party CDN-hosted resources (legitimate-looking favicon paths) and leverages JavaScript obfuscation and dynamic script injection to retrieve and decode the payload from binary image data. Stolen payment data is exfiltrated directly from the victim’s browser to attacker-controlled infrastructure. This campaign highlights the operational blind spot of repository-centric static analysis tools, which cannot detect threats injected into third-party assets or embedded in runtime-executed binary metadata. The technique underscores the need for continuous client-side runtime monitoring as a critical control layer for web supply chain attacks.

Timeline

  1. 18.03.2026 13:58 1 articles · 3h ago

    Magecart skimmer campaign abuses favicon EXIF steganography to evade static analysis

    A Magecart skimmer campaign was identified using a three-stage loader chain that hides its payload in the EXIF metadata of a favicon hosted on an attacker-controlled CDN endpoint. The payload is retrieved at runtime, decoded from binary image data, and executed in the browser via new Function(), with exfiltration occurring directly to attacker infrastructure. The technique targets the blind spot of repository-centric static analysis tools and requires client-side runtime monitoring for detection.

    Show sources

Information Snippets