SOURCE CODE FREE skimmer web in js
by F4AR - Sunday February 1, 2026 at 02:26 PM
#11
(Feb 01, 2026, 09:02 PM)abdonivanna Wrote: interesting stuff

thank u <3

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#12
(Feb 01, 2026, 02:26 PM)F4AR Wrote: This code is an advanced, heavily obfuscated web-based credit card skimmer (Magecart-style) designed to steal payment card details (and much more) from visitors on a compromised e-commerce or checkout page.
Main capabilities:
  • Multi-layer obfuscation of the exfiltration endpoint (usually a Discord webhook):
    • Custom alternating ±13 letter shift (not standard ROT13)
    • Double base64 + double URI encoding
    • String reversal
    • Webhook can be hidden in a data-* attribute on the script tag or hardcoded
  • Massive data harvesting:
    • Grabs every form field value (input, textarea, select, contenteditable)
    • Actively parses for payment data using regex:
      • Visa (^4[0-9]{12}(?:[0-9]{3})?),Mastercard(5[1−5][0−9]14 ), Mastercard (^5[1-5][0-9]{14} ),Mastercard(5[1−5][0−9]14), Amex (^3[47][0-9]{13}$)
      • CVV/CVC (3–4 digits)
      • Expiry dates (MM/YY or MMYY)
    • Also steals: cookies, localStorage, sessionStorage, full URL, User-Agent, timestamp
  • Global keylogger:
    • Records every keystroke on the page
    • Sends buffer on Enter key or when > 50 characters accumulated
  • Crude screenshot attempt:
    • Clones document body, tries to redraw visible text + basic colors on canvas
    • Converts to base64 PNG and attaches it to the Discord message
  • Exfiltration (usually to Discord):
    • Nicely formatted Discord embed
    • Green for initialization, orange for stolen data
    • Fake randomized X-Forwarded-For header + modified User-Agent
    • 3 retry attempts on failure with 2-second delay
  • Persistence & dynamic monitoring:
    • Listens to form submit events
    • Listens to real-time input events
    • Uses MutationObserver to detect newly added forms (very effective against SPAs, React/Vue/Angular sites)
  • Activation:
    • Triggers on window ‘load’ event
    • Immediately sends an “Skimmer initialized successfully” message to prove infection
This is a modern, quite sophisticated skimmer (typical of 2024–2026 campaigns), commonly injected via unpatched Magento, WordPress, Shopify vulnerabilities, supply-chain attacks on third-party JS libraries, or admin panel compromise


This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#13
thanks will check that
Reply
#14
(Feb 01, 2026, 02:26 PM)F4AR Wrote: This code is an advanced, heavily obfuscated web-based credit card skimmer (Magecart-style) designed to steal payment card details (and much more) from visitors on a compromised e-commerce or checkout page.
Main capabilities:
  • Multi-layer obfuscation of the exfiltration endpoint (usually a Discord webhook):
    • Custom alternating ±13 letter shift (not standard ROT13)
    • Double base64 + double URI encoding
    • String reversal
    • Webhook can be hidden in a data-* attribute on the script tag or hardcoded
  • Massive data harvesting:
    • Grabs every form field value (input, textarea, select, contenteditable)
    • Actively parses for payment data using regex:
      • Visa (^4[0-9]{12}(?:[0-9]{3})?),Mastercard(5[1−5][0−9]14 ), Mastercard (^5[1-5][0-9]{14} ),Mastercard(5[1−5][0−9]14), Amex (^3[47][0-9]{13}$)
      • CVV/CVC (3–4 digits)
      • Expiry dates (MM/YY or MMYY)
    • Also steals: cookies, localStorage, sessionStorage, full URL, User-Agent, timestamp
  • Global keylogger:
    • Records every keystroke on the page
    • Sends buffer on Enter key or when > 50 characters accumulated
  • Crude screenshot attempt:
    • Clones document body, tries to redraw visible text + basic colors on canvas
    • Converts to base64 PNG and attaches it to the Discord message
  • Exfiltration (usually to Discord):
    • Nicely formatted Discord embed
    • Green for initialization, orange for stolen data
    • Fake randomized X-Forwarded-For header + modified User-Agent
    • 3 retry attempts on failure with 2-second delay
  • Persistence & dynamic monitoring:
    • Listens to form submit events
    • Listens to real-time input events
    • Uses MutationObserver to detect newly added forms (very effective against SPAs, React/Vue/Angular sites)
  • Activation:
    • Triggers on window ‘load’ event
    • Immediately sends an “Skimmer initialized successfully” message to prove infection
This is a modern, quite sophisticated skimmer (typical of 2024–2026 campaigns), commonly injected via unpatched Magento, WordPress, Shopify vulnerabilities, supply-chain attacks on third-party JS libraries, or admin panel compromise


This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#15
thanks brodergggh

thanks brodergggh

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#16
thank you for sharing

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#17
I never saw code like this kind, would be a interesting read, thanks!
Reply
#18
will check for the effort and time

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#19
(Feb 01, 2026, 02:26 PM)F4AR Wrote: This code is an advanced, heavily obfuscated web-based credit card skimmer (Magecart-style) designed to steal payment card details (and much more) from visitors on a compromised e-commerce or checkout page.
Main capabilities:
  • Multi-layer obfuscation of the exfiltration endpoint (usually a Discord webhook):
    • Custom alternating ±13 letter shift (not standard ROT13)
    • Double base64 + double URI encoding
    • String reversal
    • Webhook can be hidden in a data-* attribute on the script tag or hardcoded
  • Massive data harvesting:
    • Grabs every form field value (input, textarea, select, contenteditable)
    • Actively parses for payment data using regex:
      • Visa (^4[0-9]{12}(?:[0-9]{3})?),Mastercard(5[1−5][0−9]14 ), Mastercard (^5[1-5][0-9]{14} ),Mastercard(5[1−5][0−9]14), Amex (^3[47][0-9]{13}$)
      • CVV/CVC (3–4 digits)
      • Expiry dates (MM/YY or MMYY)
    • Also steals: cookies, localStorage, sessionStorage, full URL, User-Agent, timestamp
  • Global keylogger:
    • Records every keystroke on the page
    • Sends buffer on Enter key or when > 50 characters accumulated
  • Crude screenshot attempt:
    • Clones document body, tries to redraw visible text + basic colors on canvas
    • Converts to base64 PNG and attaches it to the Discord message
  • Exfiltration (usually to Discord):
    • Nicely formatted Discord embed
    • Green for initialization, orange for stolen data
    • Fake randomized X-Forwarded-For header + modified User-Agent
    • 3 retry attempts on failure with 2-second delay
  • Persistence & dynamic monitoring:
    • Listens to form submit events
    • Listens to real-time input events
    • Uses MutationObserver to detect newly added forms (very effective against SPAs, React/Vue/Angular sites)
  • Activation:
    • Triggers on window ‘load’ event
    • Immediately sends an “Skimmer initialized successfully” message to prove infection
This is a modern, quite sophisticated skimmer (typical of 2024–2026 campaigns), commonly injected via unpatched Magento, WordPress, Shopify vulnerabilities, supply-chain attacks on third-party JS libraries, or admin panel compromise


This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#20
Wow, not something you see often.  Thanks for sharing.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  CHINA NSCC SUPERCOMPUTING BREACH – 10+ PETABYTES OF CLASSIFIED MILITARY LEAK - 2026 BerryMark 13 2,807 10 minutes ago
Last Post: MidnghtBlizzard
  Universidad de La Guajira full dump locoelcoco 1 987 23 minutes ago
Last Post: Major77
  SOURCE CODE Brazilian IPTV Panel Source & Database MisterSam 43 6,528 35 minutes ago
Last Post: softman11
  COLLECTION [exploitpack.com] ALL Exploit Leaked ! Spearr 515 28,878 1 hour ago
Last Post: zapzap2
  National Money Mart Company DataBase iloveya 8 347 1 hour ago
Last Post: courtika

Forum Jump:


 Users browsing this forum: 1 Guest(s)