Home Malware Programs Malware Qoogle JS-sniffer

Qoogle JS-sniffer

Posted: April 9, 2019

JavaScript sniffers are a new type of tool that cybercriminals may use on websites whose security they have managed to compromise. The purpose of these sniffers is to extract information transmitted to the website by its visitors, and as you can probably guess, the crooks are likely to use it on websites that offer purchases and require the payment information of their visitors. One JavaScript sniffer family that cybersecurity experts have identified recently is the Qoogle JS-sniffer. It may target a broad range of content management systems that are used for online store frequently – Magento, Shopify, WooCommerce, WordPress, OpenCart and others.

Usually, the attackers go after websites that are running outdated and vulnerable versions of the content management system or if they are using poorly secured plugins that may allow the attacker to control and modify the files found on the Web server. Often, the Qoogle JS-sniffer may be injected in the HTML code of the pages used to fill in payment information. The visitor will not notice anything out of the ordinary since their payment will go through, and they may not realize that the Qoogle JS-sniffer will scrape the data they enter and transmit it to the attacker’s server.

Since the threatening script operates on the Web server hosting the website, it may be difficult for users to protect themselves from it manually. The best piece of advice is to stick to using trustworthy and reputable online stores since they are less likely to have security vulnerabilities that would make it possible to plant the Qoogle JS-sniffer on them.

Loading...