How to Identify and Eliminate a New Malware Threat

thumb Visa recently published an alert warning merchants and acquirers of a new type of JavaScript-based malware that is specifically targeting merchants with e-commerce payment processing environments. As your neighborhood merchant advocate, we are passing this along to you. Here is what you need to know.

How the Malware Works
According to Visa, this malware strain can affect any e-commerce platform that uses database fields to populate content on their shopping cart webpage. The malware enables itself to automatically re-infect a merchant’s website following an incomplete removal. Once infected, a database trigger is added to the order table, which injects the JavaScript link into the website template fields. The malicious trigger is then executed every time a new order is made, giving hackers a back-channel to attempt to break in and steal payment data.

What You Can Do to Stay Protected
Here are some measures you can take to stay ahead of this particular malware strain:
  1. Scan your website for malware – If you haven’t already made this a habit, you should run frequent scans of your webserver to catch this e-commerce malware as well as any other types of threats, like spyware and viruses.
  2. Check for the malicious database trigger – This particular JavaScript malware has several identifying triggers. Take a look at Visa’s alert to see what the specific triggers are and what commands you can use to track them down.
  3. Use a Payment Card Industry Data Security Standard (PCI DSS) validated third-party service provider to store, process, or transmit cardholder data – These types of malware typically prey on systems that are weakly protected. The best preventative measure you can take is to be as diligent as possible with securing your payment data. That includes implementing the strongest security solutions that cover every entry point, whether it be your in-store or online payments.
Got any questions? Contact our 24/7/365 Customer Support team at 702.597.2480 (option 2) or email