diff --git a/clusters/tool.json b/clusters/tool.json index 950ef71..c6a7dc8 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -5744,7 +5744,17 @@ ] }, "uuid": "641464a6-b690-11e8-976e-bffc9a17c6a4" + }, + { + "value": "MagentoCore Malware", + "description":"A Dutch security researcher has lifted the veil on a massive website hacking campaign that has infected 7,339 Magento stores with a script that collects payment card data from people shopping on the sites.\nThe script is what industry experts call a \"payment card scraper\" or \"skimmer.\" Hackers breach sites and modify their source code to load the script along with its legitimate files.\nThe script usually loads on store checkout pages and secretly records payment card details entered in payment forms, data that it later sends to a server under the hacker's control.", + "meta": { + "refs": [ + "https://www.bleepingcomputer.com/news/security/magentocore-malware-found-on-7-339-magento-stores/" + ] + }, + "uuid": "df05f528-bb57-11e8-9fd4-8320e14151f2" } ], - "version": 87 + "version": 88 }