The credit card skimming group Fullz House has compromised the website of US mobile virtual network operator (MVNO) Boom! Mobile in a classic MageCart attack. The e-skimmer was first spotted by researchers at Malwarebytes Threat Intelligence Team, the researchers noticed a single line of code that is used to load an external JavaScript library from paypal-debit[.]com/cdn/ga.js. The malicious software collects payment card information provided by the users, then exfiltrates the harvested data as a Base64 encoded GET request.”]
Source: https://securityaffairs.co/wordpress/109144/malware/boom-mobile-e-skimmer.html

