Attack details
The breach originated from a single site template reused across multiple websites. Injecting malicious code into a first-party JavaScript file embedded in the template enabled the attacker to scale the infection across dozens of live environments—all silently skimming customer payment data.
At the core of this attack is a known vulnerability in Magento, dubbed CosmicSting. Previously linked to other skimming campaigns and covered in our post Critical Security Update for Adobe Commerce (Magento) Users this vulnerability (CVE-2024-34102) allows unauthorized access to private server files—making it an ideal entry point for compromising shared web components.
The infected asset? A first-party file:
/Global_Theme/js/flickity.pkgd.min.js
This file now opens a WebSocket connection to clearnetfab[.]net—a domain flagged as malicious on VirusTotal—then receives a Magecart payload. This payload monitors legitimate payment forms and exfiltrates sensitive data over the same WebSocket channel.