Popular US department store chain Macy’s has revealed that its website was hacked with malicious scripts in an attempt to steal customers’ payment information.
According to Bleeping Computer, the online storefront — macys.com — was infected with “unauthorized code” on October 7 to its ‘Checkout’ and ‘My Wallet’ pages, allowing the bad actor to capture credit card data. Macy’s said it was alerted to the situation on October 15, a full week after the site was breached.
The attackers were able to access detailed personal information, including the customer’s full name and address, phone number, email address, payment card number, payment card security code, and payment card month/year of expiration if they were typed on one of the compromised pages.
An anonymous researcher told Bleeping Computer that a “ClientSideErrorLog.js” script was tainted with malware to harvest payment details, which were then transmitted to a remote command-and-control (C2) server hosted at Barn-x.com.
Macy’s said it’s investigating the incident and added it had taken steps to prevent it from happening in the future. The company also told the publication only a small number of users were affected. As a corrective measure, it’s offering impacted customers one year of free credit monitoring.
When reached out for a response, a Macy’s spokesperson said: “We are aware of a data security incident involving a small number of our customers on Macys.com. We have investigated the matter thoroughly, addressed the cause and have implemented additional security measures as a precaution. All impacted customers have been notified, and we are offering consumer protections to these customers at no cost.”
Increasing prevalence of Magecart attacks
Although spotted in the wild since 2010, this kind of intrusion — dubbed Magecart attack because of the threat actors’ initial preference for Magento e-commerce platform to gather illicit card data — has intensified over the last two years.
“Magecart is a rapidly growing cybercrime syndicate comprised of dozens of subgroups that specialize in cyberattacks involving digital credit card theft,” cybersecurity firm RiskIQ noted in its report on the Magecart actors.
The recent wave of e-skimming attacks have grown so widespread — affecting over 18,000 domains — that it’s led the FBI to issue a warning about the emerging cyber threat and urging businesses to erect sufficient security barriers to protect themselves.
The intelligence agency, in an advisory posted last month, recommended that companies keep their software up-to-date, enable multi-factor authentication, segregate critical network infrastructure, and watch out for phishing attacks.
As a customer, unfortunately, there isn’t much you can do to safeguard yourself from formjacking attacks. One course of action is to use a virtual payment card service such as Blur, MySudo, or Privacy.com.
That way, even if your credit card details get compromised, the attackers won’t be able to use it to make unauthorized payments on your behalf. But the downside to this approach is that they’re available only to US residents, so you’re out of luck if you live elsewhere.
If anything, the incident is yet another reminder that you practice good security hygiene, and be on the lookout for any instances of financial fraud or identity theft.
(The story was updated on Nov. 20 8:30 AM IST with a statement from Macy’s.)