MAGECART RETURNS: THREAT ACTORS REBRAND GTM-HIDING ATTACKS

June 3, 2025

The Source Defense Research Team has observed an infrastructure shift in a persistent Magecart campaign. The attackers have reactivated a previously dormant domain—jqueri[.]at—continuing their established strategy of hiding malicious scripts behind Google Tag Manager (GTM) containers. This move is part of an ongoing effort to stay ahead of domain blacklists and maintain a foothold across targeted websites.

Attack summary

Over the past year, our team has tracked the use of GTM containers to inject innocent-looking scripts tied to the following domains served from the same IP address:

  • jsdelivr[.]at – observed in 13 GTM IDs.
  • gstatis[.]co – observed in 18 GTM IDs.

Although jqueri[.]at had remained inactive during that time, in May 2025 we detected a shift:

  • gstatis[.]co stopped serving malicious payloads.
  • 17 GTM containers previously linked to gstatis[.]co began loading jqueri[.]at, also from the same IP address.
  • new GTM ID and a direct reference to jqueri[.]at were found on a compromised merchant’s site

This evidence points to an intentional rebranding by the attackers—designed to circumvent static domain blocks while continuing to operate via GTM infrastructure.

Key Takeaways

  • GTM remains the core delivery mechanism: Scripts injected via GTM are hard to detect, as they are injected dynamically and don’t require modification of a site’s source code.
  • Domain swapping maintains stealth: Replacing gstatis[.]co with jqueri[.]at helps evade blacklists.
  • Familiar infrastructure, new domain: The shift shows the group’s continued reliance on GTM, highlighting its value in enabling persistence and obfuscation.
  • Script names deliberately resemble valid known-services to evade detection.

How does Source Defense protect you

Intelligence-driven threat detection: Continuous monitoring of GTM behavior and domain reassignments allows us to quickly identify and block threats.

Real-time protection with Protect: Customers using this product receive automated blocking for scripts tied to known malicious GTMs or domains.

Proactive alerts with Detect: Customers are notified when:

  • Scripts attempt to access PCI/PII
  • Malicious domains like jqueri[.]at are contacted

As attackers adapt their tactics, staying ahead requires real-time visibility, rapid response, and deep understanding of client-side threats—exactly what Source Defense delivers.

PCI DSS 4.0 makes client-side security a priority.

Source Defense delivers a solution for 6.4.3 and 11.6.1 without adding a burden to your security teams.

Scroll
Source Defense
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.