New Malware “NginRAT” Is Targeting eCommerce Servers

December 3, 2021

Sansec researchers have discovered another malware that targets e-commerce servers and carries out server-side attacks to steal payment card data from online shops.

The malware, called NgrinRAT, is a combination of the application it targets and the remote access capabilities it offers, bypassing detection by hiding on Nginx servers. According to researchers, traces of infected servers have been discovered in the United States, Germany, and France.

They also pointed out that while the malware is found on servers infected with CronRAT, a remote access trojan that hides payloads in tasks to be executed on an invalid day in the calendar, they are working towards the same goal.

This goal involves providing remote access to the compromised system. They explained that the attackers behind the malware use it to modify server-side codes that allow them to monitor and record data submitted by users. While the malware may be available on the server or be detected, administrators are still advised to check the cron tasks, as the malware could also embed itself there without being detected.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn