According to Help Net Security, the attack of Claire’s online store has been flagged by Sansec researchers. According to them, the skimmer was distributed from a domain made to look like it might belong to the company (claires-assets.com). Moreover, it has been reported that the domain was added between 25-30 April 2020.
Although it is still unknown how the attackers managed to compromise the online shops, it appears that they might have started planning the attack a month before executing it. Besides, they registered the malicious domain a day after Claire’s announced it will temporarily close all of its brick and mortar stores due to the COVID-19 pandemic.
Regarding Intersport’s case, ESET researchers have reported that the attack of Intersport’s web store was discovered and fixed within several hours of ESET letting them know. Furthermore, Intersport made a statement on 17 June 2020, revealing that a code that had the purpose of scanning payment card data was installed on their websites. However, no payment card information was intercepted, as online card payments are processed through the independent WSPay payment platform, which was not affected by the malicious code.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now
We welcome comments that add value to the discussion. We attempt to block comments that use offensive language or appear to be spam, and our editors frequently review the comments to ensure they are appropriate. If you see a comment that you believe is inappropriate to the discussion, you can bring it to our attention by using the report abuse links. As the comments are written and submitted by visitors of the The Paypers website, they in no way represent the opinion of The Paypers.