A complicated new malvertising scheme has emerged, remodeling trusted e-commerce web sites into phishing traps with out the data of web site house owners or advertisers.
Cybercriminals are exploiting integrations with Google APIs, particularly via JSONP (JSON with Padding) calls, to inject malicious scripts into authentic on-line shops.
These scripts function covertly, redirecting unsuspecting customers to fraudulent fee pages the place they’re tricked into disclosing delicate bank card data below the guise of paying trusted retailers.
Not like conventional malvertising campaigns that depend on suspicious advertisements or overt redirects, this assault leverages the credibility of high-quality websites and clear advert placements, making it notably insidious.
Buyers clicking on authentic commercials are led to actual storefronts, solely to come across invisible threats hidden beneath the floor.
A notable case concerned Ray-Ban’s Indian retailer (india.ray-ban.com), the place attackers compromised the location’s backend, turning a trusted model into an unwitting phishing platform.
This double-edged technique permits attackers to hijack model credibility whereas exploiting the victimized firms’ advertising and marketing efforts to drive site visitors to their scams all with out investing in distribution.
Exploiting Legit E-Commerce Websites for Phishing
The core of this assault lies within the exploitation of JSONP, a now-outdated method used to bypass the browser’s same-origin coverage by loading knowledge from exterior domains through script tags.

JSONP responses execute instantly upon loading, providing no management over the content material and posing vital safety dangers, together with susceptibility to cross-site scripting (XSS) assaults.
If an attacker compromises an API endpoint, they will inject malicious JavaScript that executes unchecked.
Complicating issues additional, even sturdy Content material Safety Coverage (CSP) configurations usually fail to dam these payloads as a result of trusted domains like Google’s are explicitly allowed.
Weak Google APIs, reminiscent of translate.googleapis.com, accounts.google.com, and www.youtube.com, have been recognized as vectors for delivering these malicious scripts.
This vulnerability, initially uncovered by Supply Protection’s analysis crew and reported to Google on November 19, 2024 (Problem ID: 379818473), allows attackers to bypass typical defenses and goal customers on authentic platforms.
JSONP Vulnerabilities in Google APIs
The assault chain usually culminates in redirects to pretend fee pages hosted on malicious domains like montina[.]it or premium[.]vn, as evidenced by captured community site visitors from compromised websites.

Many affected e-commerce platforms, together with these operating Adobe Commerce and Magento, have proven proof of a number of injected scripts, amplifying the danger to customers.
Regardless of the menace being disclosed to Google in November 2024, a number of compromised web sites stay energetic, persevering with to show customers to phishing dangers.
The persistence of this assault, although presently small in scale, is alarming because of its sophistication and skill to weaponize trusted infrastructure.
Past phishing, attackers can exploit these vulnerabilities for auto-redirect assaults, silently funneling customers to rip-off pages with none interplay, which severely erodes consumer belief and damages writer fame.
The case of india.ray-ban.com, beforehand compromised through the CosmicSting vulnerability, highlights the recurring nature of such threats, despite the fact that the location has since been remediated.
As cybercriminals proceed to use trusted domains like Google’s to ship malicious payloads, fixed vigilance and proactive monitoring for suspicious script injections are important.
This evolving menace underscores the necessity for enhanced safety measures to guard customers and protect the integrity of authentic on-line platforms within the face of more and more covert assaults.
Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, & X to Get Instantaneous Updates!