<\/a><\/figure><\/div>\n\n\nWhen the checkout button is clicked, a script captures credit card data using the querySelectorAll function. This script also harvest sensitive information like name, address, and card number. The stolen details are sent to the domain amazon-analytic[.]com, registered in February 2024, which has been used in other credit card theft cases. Attackers often use well-known brand names in domain names in an attempt to evade detection.<\/p>\n\n\n\n
Upon analyzing the malicious script, the experts noticed an interesting “swapme” file reference. Although initially invisible, using the vi<\/code> command revealed a swap file containing the same malware as the infected bootstrap.php<\/code>. Attackers used this swap file to keep malware on the server and evade detection. After removing the swap file and clearing caches, the checkout page was clean.<\/p>\n\n\n\n