{"id":45245,"date":"2026-04-09T07:38:49","date_gmt":"2026-04-08T23:38:49","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/hackers-use-pixel-large-svg-trick-to-hide-credit-card-stealer\/"},"modified":"2026-04-09T07:38:49","modified_gmt":"2026-04-08T23:38:49","slug":"hackers-use-pixel-large-svg-trick-to-hide-credit-card-stealer","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/hackers-use-pixel-large-svg-trick-to-hide-credit-card-stealer\/","title":{"rendered":"Hackers use pixel-large SVG trick to hide credit card stealer"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/11\/05\/Credit-card-hacker.jpg\" width=\"1600\" alt=\"Hackers use pixel-large SVG trick to hide credit card stealer\"><\/p>\n<p>A massive campaign impacting nearly 100 online stores using the Magento e-commerce platform hides credit card-stealing code in a pixel-sized Scalable Vector Graphics (SVG) image.<\/p>\n<p>When clicking the checkout button, the victim is shown a convincing overlay that can validate card details and billing data.<\/p>\n<p>The campaign was discovered by&nbsp;eCommerce&nbsp;security company Sansec, whose researchers believe that the attacker likely gained access by exploiting the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-polyshell-flaw-allows-unauthenticated-rce-on-magento-e-stores\/\" target=\"_blank\" rel=\"nofollow noopener\">PolyShell vulnerability<\/a> disclosed in mid-March.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Hackers use pixel-large SVG trick to hide credit card stealer\"><\/a> <\/div>\n<p>PolyShell&nbsp;impacts&nbsp;all Magento Open Source and Adobe Commerce stable version 2 installations, allowing unauthenticated code execution and account takeover.<\/p>\n<p>Sansec warned that <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/polyshell-attacks-target-56-percent-of-all-vulnerable-magento-stores\/\" target=\"_blank\" rel=\"nofollow noopener\">more than half of all vulnerable stores<\/a> were targeted in PolyShell attacks, which in some cases deployed payment card skimmers using WebRTC for stealthy data exfiltration.<\/p>\n<p>In the latest campaign, the researchers found that the malware is injected as a 1&#215;1-pixel SVG element with an &lsquo;onload&rsquo; handler into the target website&rsquo;s HTML.<\/p>\n<p>&ldquo;The onload handler contains the entire skimmer payload, base64-encoded inside an atob() call and executed via setTimeout,&rdquo; <a href=\"https:\/\/sansec.io\/research\/svg-onload-magecart-skimmer\" target=\"_blank\" rel=\"nofollow noopener\">Sansec explains<\/a>.<\/p>\n<p>&ldquo;This technique avoids creating external script references that security scanners typically flag. The entire malware lives inline, encoded as a single string attribute.&rdquo;<\/p>\n<p>When unsuspecting buyers click checkout on compromised stores, a malicious script intercepts the click and displays a fake &ldquo;Secure Checkout&rdquo; overlay that includes card details fields and a billing form.<\/p>\n<p>Payment data submitted on this page is validated in real time using the Luhn verification and exfiltrated to the attacker in an XOR-encrypted, base64-obfuscated JSON format.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"332\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/payload.jpg\" width=\"512\" alt=\"Hackers use pixel-large SVG trick to hide credit card stealer\"><figcaption><strong>Decoded payload<\/strong><br \/><em>Source: Sansec<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Sansec identified six exfiltration domains, all hosted at IncogNet LLC (AS40663) in the Netherlands, and each getting data from 10 to 15 confirmed victims.<\/p>\n<p>To protect against this campaign, Sansec recommends the following:<\/p>\n<ul>\n<li>Look for hidden SVG tags with an onload attribute using atob() and remove them from your site files<\/li>\n<li>Check if the _mgx_cv key exists in browser localStorage, as this indicates payment data may have been stolen<\/li>\n<li>Monitor and block requests to \/fb_metrics.php or any unfamiliar analytics-like domains<\/li>\n<li>Block all traffic to the IP address 23.137.249.67 and associated domains<\/li>\n<\/ul>\n<p>As of writing, Adobe has still not released a security update to address the PolyShell flaw in production versions of Magento. The vendor has only made a fix available in the pre-release version 2.4.9-alpha3+.<\/p>\n<p>Also, Adobe has not responded to our repeated requests for a comment on the topic.<\/p>\n<p>Website owners\/admins are advised to apply all available mitigations and, if possible, upgrade Magento to the latest beta release.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-pixel-large-svg-trick-to-hide-credit-card-stealer\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Hackers use pixel-large SVG trick to hide credit card stealer\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach\/\">Snowflake customers hit in data theft attacks after SaaS integrator breach<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-crystalrat-malware-adds-rat-stealer-and-prankware-features\/\">New CrystalRAT malware adds RAT, stealer and prankware features<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-confirms-data-breach-after-europaeu-hack\/\">European Commission confirms data breach after Europa.eu hack<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-confirms-hack-of-director-patels-personal-email-inbox\/\">FBI confirms hack of Director Patel&#8217;s personal email inbox<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-investigating-breach-after-amazon-cloud-account-hack\/\">European Commission investigating breach after Amazon cloud account hack<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A massive campaign impacting nearly 100 online stores u [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45245","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45245"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45245\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}