ALL >> Computers >> View Article
Security Experts Identify New Malware Targeting Users Of E-commerce Websites

Cybercriminals use different techniques to compromise computers and steal confidential information. Recently, security researchers at Trend Micro identified a new malware that targets users of e-commerce websites. Cybercriminals first compromise websites by inserting an iframe. When users visit the compromised sites, some of the URLs on these sites cause several redirections, which ultimately result in exploitation of several vulnerabilities. Attackers exploit vulnerabilities associated with RDS.Dataspace, Java Deployment Toolkit, Adobe Reader and Java Runtime environment. Exploitation of the vulnerabilities allow attackers to either cause denial of service, execute arbitrary code or affect availability, confidentiality and integrity and redirect users to another web address, which downloads a malware detected as TROJ_JORIC.BRU. Once downloaded on the computer systems, the malware attempts to capture login credentials, credit card details and other confidential information and send them to a remote website. After gaining access to the required information, the malware deletes itself to avoid detection. Cybercriminals may use ...
... extracted information to gain unauthorized access to online shopping and banking accounts, conduct unauthorized transactions or even create fake accounts by using the identity of the victims. They may also use the accessed credit card details to develop counterfeit credit cards. Attackers also sell the stolen data to their peers in the underground cybercrime market.
According to the security firm, the attack has affected over 90,000 web pages, which use osCommerce solutions. While users face the risk of compromising sensitive personal and financial data, business face the risk of disruption in business operations resulting in financial loss or loss of productive business hours. Security professionals must update their technical skills and expertise through distance learning and online university degree programs to tackle the sophisticated attacks emanating in the IT environment.
Organizations must regularly scrutinize their websites to detect iframe, SQL injection and other web-based vulnerabilities. Professionals qualified in penetration testing, secured programming and computer science degree programs may help organizations in timely assessment of security threats, detection and mitigation of vulnerabilities before their exploitation by cybercriminals. They must have proper patch management policy in place to track and implement requisite security updates.
Internet users must regularly scan their computer systems with updated security software to detect, block and remove Trojans and viruses. They must update their computer software and adhere to the guidance and advisories provided by developers, Internet security firms and computer emergency response teams. Internet users may benefit from online degree and learning programs to acquaint themselves of security threats and improve online computing practices.
Add Comment
Computers Articles
1. How A Free Seo Checker Can Help You Understand And Improve Your WebsiteAuthor: Mahesh
2. "empowering Digital Excellence: Lcc Computer Education In Bhubaneswar"
Author: Khushi Gill
3. How Cat6 Ethernet Cables Improve Streaming, Gaming, And Downloads
Author: Jennifer Truong
4. Why Choose The 1452 Bluetooth Scanner In 2025?
Author: prime pos
5. Scraping Chipotle Menu Data From All Us Locations
Author: Food Data Scrape
6. The Rise Of Digital Marketing Agencies: A Deep Dive Into The Digital Marketing Landscape In Bangalore
Author: Cubikeymedia
7. What Are The Different Types Of Computer Cables?
Author: Jennifer Truong
8. How To Check If Your Business Idea Will Really Work?
Author: goodcoders
9. Boost Insights With Carfax Car Listing Data Extraction
Author: travel scrape
10. Cat6 Ethernet Cable: The Key To Faster Internet
Author: Jennifer Truong
11. Google Ads Company In Dubai: Realizing Business Growth With Webtek Digital
Author: webtek Digiytal
12. How To Troubleshoot Common Usb Cable Issues?
Author: Jennifer Truong
13. Why Melbourne’s Computer Shops Are The Best For Custom-built Pcs?
Author: Jack Williams
14. How To Manage Staff Productivity When Working Virtually?
Author: goodcoders
15. The Future Is Now – Top Digital Marketing Updates In 2025
Author: Gautam Khatnani