
A sophisticated multi-stage carding attack has been identified targeting Magento eCommerce sites running outdated versions, particularly Magento 1.9.2.4, which has been unsupported since June 20201. The attack leverages a combination of fake GIF files, reverse-proxy malware, and client-side session tampering to steal credit card data during checkout. This article breaks down the attack flow, technical details, and mitigation strategies.
Attack Overview
The attackers exploited unpatched vulnerabilities in Magento 1.9.2.4, injecting malicious JavaScript disguised as a `.gif` file (`/media/magentothem/img/line.gif`)2. The payload included a PHP reverse-proxy loader that intercepted and tampered with requests, masking the attacker’s IP (`217.12.207.38`). The malware also abused `sessionStorage` to validate user-specific keys, ensuring the payload only executed during checkout3.
Technical Breakdown
The attack followed a multi-stage process. First, JavaScript was injected between Bing UET tags on checkout pages, referencing the fake `.gif` file. The reverse-proxy server then captured credit card details, login credentials, and session tokens while rewriting responses to appear legitimate1. Secondary injections in `onestepcheckout.phtml` used obfuscated JavaScript to dynamically construct paths and exfiltrate data via concatenated strings (e.g., `rep` + `lace` ignoring `bing`)2.
Mitigation Strategies
For administrators, upgrading to supported Magento 2.x versions and applying security patches is critical4. Deploying a web application firewall (WAF) to block malicious IPs and monitoring logs for repeated `/guest-carts/
Relevance to Security Professionals
This attack highlights the risks of running outdated software and the need for robust input validation and session management. The use of reverse-proxy malware to mask exfiltration is a notable evasion technique, requiring advanced detection methods such as behavioral analysis and endpoint monitoring.
Conclusion
The multi-stage carding attack underscores the importance of timely patching and layered security measures. Organizations using Magento should prioritize migration to supported versions and implement proactive monitoring to mitigate similar threats.
References
- “Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware,” GBHackers, 2025.
- “Fake GIF Leveraged in Multi-Stage Reverse-Proxy Card Skimming Attack,” Sucuri, 2025.
- “Magento Carding Vulnerability,” GitHub Issue #28614, 2025.
- “Carding Attacks on Magento: What Is It and What Can You Do,” Ayko Solutions, 2025.