News

Infowars Online Store Infected by Card Skimming Malware

By Nitish Singh / November 14, 2018

The Infowars online store contained malware that allowed attackers to collect payment card data from users and transfer the data to remote servers. The malware has been taken down after ZDNet reached out to the website’s staff. The generic Magecart infection was detected earlier today after security researcher Willem de Groot was running a scan on the website.

According to a security report, less than 1,600 Infowars users have been affected. The actual affected number may be even smaller if users re-ordered products from the website. Infowars owner Alex Jones revealed in a statement “America is under attack by globalist forces and anyone standing up for our republic will be attacked mercilessly by the corporate press, Antifa and rogue intelligence operatives. Infowars will never surrender!”

It is possible that there is a new Magecart group with reports from RisqIQ and Flashpoint revealing that similar attacks have been spotted from other groups. The coding style is different from the known Magecart groups and another 100 stores that are affected by the same malware as Infowars was. The code comes with built-in “stealth mode” to avoid being detected, the implementation is not perfect which led to the malicious software being caught.

It is unknown how much of Jones’ claim is true as the Infowars owner has been dragged into controversy due to his conspiracy theories and hate speech. Multiple social media platforms have banned Jones and it is highly likely that the attack on the website was to target him. Details on how the website was infected have been left out to prevent future customers from being at risk as patching errors can lead the security flaw to resurface.

What do you think about the attack on Infowars? Let us know in the comments below. Get instant updates on TechNadu’s Facebook page, or Twitter handle.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: