PlayBack Now was hit with a two-pronged attack designed to steal payment card and other information from company’s customers. Fraudsters created a typosquatting-based website as an obfuscation tool to fool site administrators. They injected a JavaScript skimmer into the Magento e-commerce platform within the websites PlayBack now built for its customers. Information stolen includes cardholder names, credit card numbers, expiration dates and the card’s CVV, Malwarebytes says. The attackers have not been identified as being members of a group that falls under the Magecart umbrella of card-skimming gangs.”]
Source: https://www.cuinfosecurity.com/video-conference-firm-targeted-for-payment-card-skimming-a-15150

