Magento Mayhem: Credit Card Skimmer Strikes Again via Google Tag Manager!
Threat actors are sneaking credit card skimmer malware onto Magento sites using Google Tag Manager. This sneaky tactic disguises the malware as normal analytics scripts, secretly pilfering credit card info from checkout pages. If GTM is the Trojan Horse, our wallets are the unsuspecting Trojans. Stay vigilant, shoppers!

Hot Take:
Looks like Google’s got a new tagline: “Don’t be evil, but if you must, at least obfuscate your evil deeds in our Tag Manager!” You know things are serious when even Google Tag Manager gets a promotion to the villainous role of card-skimming accomplice. The real crime here? Making Sucuri do double duty as a digital detective while we all pretend to be shocked.
Key Points:
- Threat actors are using Google Tag Manager to deploy credit card skimmer malware on Magento sites.
- The malware masquerades as a typical GTM and Google Analytics script.
- Three websites are currently confirmed to be infected, down from six.
- The malware is stored in the Magento “cms_block.content” database table.
- This isn’t GTM’s first rodeo with cybercrime, having been previously used for malvertising in 2018.
Already a member? Log in here