Its full process of attacks have been around, using a series of steps to hide its existence and sending different strategies for data data.
One smart one of the invaders to catch their malware (again, sadly, not keep up from magecart attacks) to load their code in unused GitTub project. Criminals try to take project ownership and publish a new “version of the code containing malware. This has a direct benefit of getting malware immediately in effective use of all websites. Safety tools cannot scan the code from GitHub, so criminals can hide from obvious eyes and separate from the reduced project.
At least British Airways Hack, the magecarts adapt to a specific program, according to various messages. This includes how the flight tax pages are formed, which means they are directly targeted.
Source link