Remove favicon favicon.ico
article thumbnail

Crooks hide e-skimmer code in favicon EXIF Metadata

Security Affairs

Experts noticed that the script would load a favicon file that is identical to the one used by the compromised website. The initial JavaScript loads the skimming code included in the EXIF metadata of the favicon.ico using an <img> tag, and specifically via the onerror event. xyz (archive here ). . Pierluigi Paganini.

article thumbnail

Segway e-store compromised in a Magecart attack to steal credit cards

Security Affairs

Attackers added JavaScript to Segway’s online store that pretended to display the site’s copyright, but that was used to load an external favicon that contained the e-skimming code. “The threat actors are embedding the skimmer inside a favicon.ico file. ” reads the analysis published by Malwarebytes.

CMS 97