RELYING ON EXTERNAL PAYMENT PROVIDERS IS NOT ENOUGH; HUNDREDS OF SUCH SITES ARE UNDER ATTACK

June 24, 2025

Many eCommerces assume they’re safe since they don’t collect payment data; instead users are redirected to trusted providers like  Stripe, PayPal and others. An active CosmicSting Magecart variant proves that belief dangerously false.

The Source Defense Research Team has observed a persistent variant of the CosmicSting attack that triggers just before redirection to external payment services. Using a fake branded form – see Stripe example below – attackers intercept credentials moments before users reach the legitimate provider.

These forms are designed to be indistinguishable from the real interface and appear at the most opportune time — right when the user thinks they’re safely checking out via a secure third-party gateway. Unfortunately, the real redirect comes too late to prevent the damage.

Even businesses that never store or transmit payment data themselves are exposed. The attack shows that outsourcing payment does not mean outsourcing risk.

CosmicSting campaign sttack details

The broader CosmicSting campaign remains ongoing, despite earlier disclosures. Our research confirms infections on hundreds of websites globally, with attackers using fresh domains — all previously unlisted on major blacklists – to slip past conventional defenses unnoticed.

The communication method continues to leverage WebSocket connections, with the Magecart payload embedded in the very first WebSocket message, further complicating detection.

This technique is especially effective on sites that believe they’re secure because they don’t process payment data directly. But the attack hits just before the protection kicks in — exposing the gap in coverage.

CosmicSting exploits a critical vulnerability — CVE-2024-34102 — which grants unauthorized access to private server files. When paired with the recently exposed Linux iconv bug, this vulnerability may even open the door to remote code execution — a rare and dangerous combination.

Dive deeper into the vulnerability details via our blog:

 Critical Security Update for Adobe Commerce / Magento Users

How does Source Defense Keeps You Safe

To protect against these sophisticated techniques, Source Defense provides:

  • Ongoing of new domains linked to CosmicSting.
     
  • WebSocket exfiltration monitoring for early detection of client-side threats, under the “Data transfer” script behavior listed.

No matter how you handle payments — in-house or through external services — you must secure the entire client-side environment; otherwise, your site remains exposed and vulnerable.

PCI DSS 4.0 makes client-side security a priority.

Source Defense delivers a solution for 6.4.3 and 11.6.1 without adding a burden to your security teams.

Scroll
Source Defense
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.