Credit Card Crooks: Magento Stores Hit by Google Tag Manager Skimmer Scam
Cyber crooks are now using Google Tag Manager to install e-skimmer malware on Magento e-stores, making them the digital equivalent of sneaky pickpockets. The malicious code disguises itself as legitimate scripts, stealing credit card data right under everyone’s noses. Talk about a high-tech heist!

Hot Take:
Who knew that Google Tag Manager, the unsung hero of the marketing world, could moonlight as a villain in the e-commerce heist of the decade? It’s like finding out your sweet grandma is the mastermind behind a global crime syndicate. Kudos to the cyber crooks for their creativity, but let’s hope the e-stores fight back before this plot turns into a Hollywood blockbuster!
Key Points:
- Sucuri researchers caught cybercriminals using Google Tag Manager (GTM) to plant e-skimmer malware on Magento-based e-stores.
- GTM is typically a tool for managing marketing tags without altering site code, but these crooks had other plans.
- The malware was hidden in the website’s database, masquerading as legitimate Google scripts to dodge detection.
- Three sites were currently infected, a decrease from six previously reported, hinting at a possible decline in activity.
- The script employs obfuscation techniques, making it as tricky to uncover as a magician’s card trick.
Already a member? Log in here