Sigma Chi HQ

Main Menu

  • Home
  • Customer payment
  • Direct debit
  • Credit card
  • Digital wallets
  • Payment method

Sigma Chi HQ

Header Banner

Sigma Chi HQ

  • Home
  • Customer payment
  • Direct debit
  • Credit card
  • Digital wallets
  • Payment method
Customer payment
Home›Customer payment›UK retailer Sweaty Betty hacked to steal customer payment information

UK retailer Sweaty Betty hacked to steal customer payment information

By Meaghan H. Gonzales
December 4, 2019
27
0


UK sportswear retailer Sweaty Betty’s website has been hacked to insert malicious code that attempts to steal a customer’s payment information while shopping.

This type of attack is called Magecart and involves a hacker who compromises an online site in order to inject malicious code into the checkout or other pages that ask for payment information. When a customer enters payment information on one of these hacked pages, the malicious script will send it to a remote server exploited by the attacker.

In emails sent to Sweaty Betty customers, the retailer states that customers shopping online between November 19, 2019 at 6:24 p.m. (GMT) and November 27, 2019 at 2:52 p.m. (GMT) may have had their credit card. or stolen debit card details.

“These investigations confirmed that a third party gained unauthorized access to part of our website and inserted malicious code designed to capture information entered during the checkout process. This affected customers attempting to place orders. online or by phone for limited intermittent periods from Tuesday, November 19 at 6:24 p.m. (GMT to Wednesday, November 27, 2019 at 2:22 p.m. (GMT). “

The notification goes on to say that customers who paid with a credit or debit card during the time of the hack would have had their name, Sweaty Betty password, billing address, shipping address, email address, phone number. stolen phone, payment card number, CVV number and expiration date.

Sweaty Betty Cyber ​​Security Incident Notification
Sweaty Betty Email (Source: Twitter)
Click to see full size

As Magecart scripts rely on users entering new credit card information on the site, those who had recorded payment information were not affected by this compromise. Additionally, Sweaty Betty states that customers making purchases with PayPal or Apple Pay have not been affected.

At the moment, there is no notification on their website and users looking for more information regarding emails are asked to contact their customer service email.

Tweeter

BleepingComputer has contacted Sweaty Betty to ask about the attack, but has not had a response yet.

Custom.js script modified

Magecart security expert Willem de Groot from Sanguine Security Labs told BleepingComputer that the hackers modified the script https://www.sweatybetty.com/on/demandware.static/-/Library-Sites-sweatybettylibrary/en_US/v1574703272172/js/custom.js to add malicious code at the bottom.

This can be seen in the archived version where you can see obfuscated JavaScript added to the bottom of a legitimate script used by the site.

Betty Magecart's sweaty script
Betty Magecart’s sweaty script

When users enter the payment information, the script steals the payment information by sending it to the URL https: //www.cdcc02[.]com / widgets / main.js.

Part of script showing the exfiltration server
Part of script showing the exfiltration server

de Groot also notes that unlike most Magecart attacks that target Magento, sweatybetty.com runs Demandware.

“Unlike most of the Magecart hacks that happen on Magento, Sweaty Betty runs Demandware, which is popular among larger stores.”

What should Sweaty Betty customers do?

If you’ve recently made purchases from sweatybetty.com, the first thing customers should do is contact their credit card company or bank and explain what happened.

They should also monitor their credit or debit card statement for suspicious or fraudulent charges and, if so, report them immediately. These charges can appear several months later, so customers should check their statements every month for at least 6 months, or even longer.

Finally, all recent Sweaty Betty customers should change their password on the site as they were also allegedly stolen as part of this attack.



Related posts:

  1. Changes to customer payments at Bermuda Gas
  2. Compromised customer payment information at 34 Spec stores
  3. Customer’s credit card data stolen, $ 5 off next purchase offered as an apology gift
  4. MABS Hires Operator, Approves New Customer Payments Program, May Farm Land – The Shenandoah Sentinel
Tagsapple paycredit debitcustomer service
  • Credit card
  • Customer payment
  • Digital wallets
  • Direct debit
  • Payment method
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • September 2018
  • July 2018
  • May 2018
  • April 2018
  • March 2018
  • January 2018
  • December 2017
  • October 2017
  • August 2017
  • April 2017
  • December 2016
  • November 2016
  • October 2016
  • June 2016
  • April 2016
  • December 2015
  • August 2015
  • May 2015
  • March 2014
  • September 2013
  • March 2012
  • How to spot predatory lenders
  • Digital Wallet Market to See Amazing Growth by 2031 – Carbon Valley Farmer and Miner
  • Microsoft warning that scammers could spoof your credit card with an online payment trick – how to stay safe
  • CFPB and New York Attorney General end debt collection ring
  • Two Chandigarh residents lose ₹3.9 lakh in credit card fraud
  • Privacy Policy
  • Terms and Conditions