BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Payment data of LCBO customers leaked to the darknet


    Canadian alcohol retail giant LCBO (Liquor Control Board of Ontario) has announced that "an unauthorized party has injected malicious code" into its website to steal customer information during the checkout process. Representatives of the company said that within five days in January, customer information "could have been compromised."

    In fact, the infection occurred back in December, during an attack on the LCBO website that lasted more than a week. The company did not publicly report this attack.

    LCBO is a state-owned enterprise and is currently one of the largest retailers and wholesalers of alcoholic beverages in the world. The company said last week that it was temporarily shutting down its website and app to investigate a "cybersecurity incident." According to the statement, all of the company's retail stores (680 stores) operate without risk to customer safety. External experts were brought in to resolve the incident.

    “We are currently able to confirm that an unauthorized party has injected malicious code into our website. This code was designed to retrieve customer information during the checkout process,” LCBO said, adding that customer information provided on the checkout pages may have been “compromised.”

    The stolen information included customer names, their email addresses, passwords, and card payment details. LCBO urged customers who made purchases during this time period to carefully review card payments and report suspicious transactions immediately.

    The LCBO is currently identifying specific clients affected by the attack in order to communicate directly with them. The website and app are back up and running, but all account passwords have been reset. Over the past three months, the website has averaged more than 3 million monthly visits, of which 94% were from Canada and 3% from the US.

    The hackers reportedly injected JavaScript code into the LCBO website, allowing them to export all the data that the victims entered at checkout. Recorded Future researchers said they have seen this hack in various interpretations since August 2020. They found five other infected e-commerce domains that used the same malicious domain — lotilabs[.]org — to either host an e-skimmer or exfiltrate data.

    Tanium's Tim Morris said e-skimmer attacks have been around for years, but many retailers still haven't learned from the high-profile incidents involving Target and Ticketmaster.

    “Many business owners are just running their business but don't have the technical expertise or resources to avoid these types of incidents,” Morris said. He added: “From a consumer perspective, it’s best to always use fraud-proof cards, virtual cards, and keep track of your purchases regularly.”

    Magecart Overwatch found 1,520 unique malicious domains involved in infecting 9,290 e-commerce domains in 2022. Customer card data has been leaked from over 1,000 different organizations. In 2022, electronic skimmers led to 45.6 million compromised payment card entries being offered for sale on dark web platforms, according to researchers.

    Author DeepWeb
    Market for psychoactive substances in 2022. Part 3
    Ransomware revenue plummets

    Comments 0

    Add comment