Brand News
Jumia, Konga, Customers In Trouble As Hackers Now Extract E-Commerce Sites’ Payment Details
Jumia, Konga, Other e-Commerce Websites’ Customers In Trouble As Hackers have started Extracting E-Commerce Sites’ Payment Details of customers.
Brand News Day Nigeria gathers some top e-commerce platforms in Nigeria which is not only limited to Jumia and Konga but also other fast-rising e-commerce platforms have appeared in danger as hackers have perfected ways of how to steal customers’ payment information used on those platforms.
Flutterwave Now Sits As African Most Valued Startup, As New $250 Million Deal Pushes Flutterwave’s Worth To $3B
Recent investigation shows that about 500 sites were targeted by hackers who plant codes that divert payments from visitors who want to make purchases.
Jumia Vs Konga
E-commerce websites users in Nigeria may be vulnerable to new tricks used by hackers who target the payment information dropped by customers who visit the websites and make payments in the past.
Prominent e-commerce platforms like Jumia, Konga and a host of others are prime targets of malicious hackers who exploit vulnerabilities found in most e-commerce sites to steal the card details of their customers.
Hundreds of e-commerce sites compromised Recently, it was found that about 500 e-commerce websites were found to have been rigged by hackers who installed a card skimmer that secretly stole important data when visitors try to buy something.
Jumia, Konga, Customers In Trouble As Hackers Now Extract E-Commerce Sites’ Payment Details
According to a report published on Tuesday, February 15, 2022, is the latest one that involves Magecart, a general term given to crime syndicates that contaminate e-commerce sites with skimmers.
In recent years, thousands of sites have been hit by hackers that take advantage to run hostile codes. Whenever visitors enter payment card details during a purchase, the code sends that to hacker-controlled servers.
How hackers enter vulnerable sites, according to wired, the security company, Sansec that found out the newest batch of contaminations said the infected sites were all loading hostile scripts at the domain naturalfreshmall.[.]com.
The company said the skimmer reveals a fake payment popup, defeating a hosted payment form on the website.
According to the firm, the hackers then modified existing files or plant new files that provide about 19 backchannels that they could use to retain control over the sites in event that a hostile script was updated.
The only way to fully clean up the site is to know and remove the backchannels before updating the weak CMS that allowed the backchannels in the first place.