Tags:
At Turaco Labs, our ThreatView telemetry has detected a concerning spike in compromised PrestaShop websites. As of this morning, we have identified 327 hacked sites actively running payload loaders or digital skimmer malware.
This activity aligns with the recent security alert issued by PrestaShop in January 2026, warning merchants about a sophisticated campaign targeting their platform. With nearly 300,000 stores worldwide relying on PrestaShop, this ecosystem represents a high-value target for cybercriminals looking to harvest payment data at scale.
According to PrestaShop's security alert, the attackers are replacing legitimate payment buttons on the order page with fraudulent buttons. When customers click on these fake buttons, they are redirected to counterfeit payment forms designed to capture their payment information.
The customer enters their credit card details into this fake form, and the data is stolen immediately. The transaction may then proceed normally through the legitimate payment processor, leaving the customer unaware that their payment information has been compromised - until fraudulent charges appear on their statement.
PrestaShop's security alert has identified a consistent pattern of compromise.1 If you operate a PrestaShop store, you should immediately check for the following indicators:
_partials/head.tpl file.1 This is the primary infection point being exploited.atob() JavaScript function in your code, which attackers use to decode and load malicious payloads from external sources while bypassing basic security filters.1For any merchant, a digital skimmer infection is a critical emergency. Beyond the immediate theft of funds, the liabilities are compounding:
It is important to understand that PrestaShop is not alone. This campaign is part of a larger wave of attacks targeting eCommerce platforms. We have seen similar high-volume attacks targeting Magento and Adobe Commerce (such as the CosmicSting vulnerability CVE-2024-34102) over the last year, which compromised over 4,000 stores. The reality is that automated bots are constantly scanning the web for vulnerabilities across all major platforms.
If you run a PrestaShop store, we urge you not to wait.
_partials/head.tpl file for suspicious JavaScript tags.Don't Delay. Each transaction processed while a skimmer is active compounds your legal, PII, and financial liabilities. Comprehensive security is no longer optional - it is a requirement for doing business online.
Check your site for free right now using ThreatView's scanner.
PrestaShop has recently issued a security alert warning store owners about a digital skimmer threat targeting their platform. If you're running a PrestaShop store, this is an important reminder to verify your site's security.
With growing numbers of clients hosting with WP Engine, we felt it may be useful to highlight how a WordPress eCommerce site security is handled by combining WP Engine and ThreatView.
TLDR: WP Engine gives you high-performance managed WordPress hosting. ThreatView Advanced makes sure your website stays secure.
It's Cyber Monday, following record-breaking Black Friday sales (according to Forbes magazine) and the Christmas rush is fast approaching - all with the backdrop of SessionReaper targeting Magento /Adobe Commerce sites and a significantly growing number of hacked sites worldwide.
As of this morning, we can see over 50,000 domains with indicators of compromise - with nearly 90% of the detected malware targeting eCommerce payment data.