After compromising #Volusion, #Magecart threat actor inserted @GoogleCloud hosted script to standard JS library used across their platform and credit card info to remote host Volusion-cdn[.]compic.twitter.com/nhkT5sHvyB
U tweetove putem weba ili aplikacija drugih proizvođača možete dodati podatke o lokaciji, kao što su grad ili točna lokacija. Povijest lokacija tweetova uvijek možete izbrisati. Saznajte više
After compromising #Volusion, #Magecart threat actor inserted @GoogleCloud hosted script to standard JS library used across their platform and credit card info to remote host Volusion-cdn[.]compic.twitter.com/nhkT5sHvyB
Nice work and writeup. Looks like they also have cdn-volusion[.]com, based on the cert being usedpic.twitter.com/E3NS6wZUyk
you are absolutely right. volusion-cdn[.]com is showing the same behavior.
Nice write-up! We have contacted @Volusion and @googlecloud since last week about this issue and we are talking to their teams right now. Our report is going to be also released soon. @TrendMicroRSRCHpic.twitter.com/UuZJcqFkhJ
Hi Joseph, We appreciate your outreach and desire to assist. We are DMing you to follow up on some information.
This issue seems to have been addressed. This is what I see when checking "a/j/vnav.js" on all those sites nowpic.twitter.com/b8BGo2KTds
Hi Denis, Yes, we have deployed a fix to prevent any further issues.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.