Breaking

Three Indonesian hackers were arrested for Magecart attacks on e-commerce sites.

In a press release on Jan 24, 2020, Indonesian National Police and the Interpol together did mentioned that, they have arrested three Indonesian hackers for employing Magecart attacks to breach into number of e-commerce websites and stealing the payment card details of the buyers. The hackers were arrested on Dec 20th and the same was disclosed on Jan 25th via Interpol’s Twitter Account. The Associate of South Asia Nation (ASEAN) cyber wing orchestrated an operation called the ‘Night Fury’ to identify the hackers behind the e-commerce data breaches. 

All the three hackers are pleading guilty for their multiple cyber crimes like phishing, data theft, money laundering, and more. In the case of e-commerce websites, the hackers had made use of the unpatched vulnerabilities in Magento and WordPress platforms to breach into the site and get away with their intended data. After breaching into the websites, they have employed the card skimming technique using web skimming or JS sniffer to fetch the payment card details from the shoppers.

The hackers were reported of hacking 12 e-commerce websites as per Indonesian National Police, however according to Sanguine Security it is reported that the hackers have involved themselves in hacking 571 sites in total.

Below is the tweet from Interpol’s Cyber cell,

The ‘success gan’ which means ‘success bro’ in Indonesian is found in many infrastructure for years.

The hackers have used those stolen payment card details to purchase expensive goods and also tried to resell them for cheaper rates through certain local websites.

Interpol have confirmed that there are more sophisticated individuals in Indonesia who are practising the web skimming apart from the arrested hackers, because they have received traces of skimming even when the three hackers were under custody. It is also to be noted that two days before a Russian Hacker pleaded guilty for his cybercrimes.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

49 mins ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

1 week ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 weeks ago

IAM Software: Top 5 IAM Solutions for Enterprise Security

Find the top 5 IAM software solutions, explore their features, and find the best tools…

2 weeks ago

Top 5 MDM Tools for 2024 – Best Mobile Device Management Software

MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…

2 weeks ago

Scalefusion MDM Alternatives: Top 5 Scalefusion Alternatives for IT Decision Makers

Discover the top 5 Scalefusion alternatives for MDM, offering better features, scalability, and integration for…

2 weeks ago