Security

Cyber-crime

Wacom says crooks probably swiped customer credit cards from its online checkout

Digital canvas slinger indicates dot-com was skimmed for over a month


Graphics tablet maker Wacom has warned customers their credit card details may well have been stolen by miscreants while they were buying stuff from its website.

We're told people's payment information was likely pilfered from the biz's online store between the end of November and early January, and that if you get a message from Wacom about this then consider yourself affected. If not, don't worry about it for now.

"While we are still investigating," the Japan-based manufacturer told punters in an email seen by The Register today, "we believe it may have occurred between November 28, 2024 and January 8, 2025.

"The issue that contributed to the incident has been addressed and is effectively being investigated. However, we are now writing only to customers who might have been potentially affected by this."

If you are one of the unlucky ones to get the mail, the digital art equipment slinger suggests the following:

  • Monitor your credit card statements for any unauthorized activity.
  • Contact your credit card issuer immediately if you see any suspicious charges.
  • Consider placing a fraud alert on your credit card.

The wording of the message suggests Wacom is aware of how the payment information was stolen, and has closed up whatever security weakness was involved. To us, it sounds as though someone was able to infect the maker's website with malicious code that skimmed people's card details and other info in real-time as they paid for things, and that this code exfiltrated that sensitive data to fraudsters to exploit.

There are other possibilities, such as Wacom logging sensitive payment info in a way that allowed miscreants to snatch it, but our money is on a payment page skimmer.

Wacom uses Magento for its e-commerce, which leads us to speculate someone exploited something like the CosmicSting vulnerability in that software to infect the dot-com's checkout pages and make off with netizens' credit card numbers.

Officially dubbed CVE-2024-34102, the now-patched flaw was used to steal bank card data as victims made purchases from over 4,000 online merchants in 2024, according to estimates.

The XXE (XML External Entity) vulnerability scores 9.8 out of 10 on the CVSS severity scale. Ray-Ban, National Geographic, Whirlpool, and Segway - among others - all had their web ordering pages infected via the flaw. At least seven criminal gangs were known to be abusing the bug in the wild, each using their own exploit implementations.

Wacom makes no mention of the number of people affected, nor who is thought to have carried it out and how. But the stated date range does make it look rather like the corp waited three weeks after discovering the intrusion to actually tell punters about it.

"We take the security of your personal information very seriously, and we are working diligently to resolve this issue," its email to customers concluded. "We will provide you with more information as it becomes available."

Wacom did not have any additional comment at time of going to press. ®

Send us news
3 Comments

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Check out this free automated tool that hunts for exposed AWS secrets in public repos

You can find out if your GitHub codebase is leaking keys ... but so can miscreants

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

C++ creator calls for help to defend programming language from 'serious attacks'

Bjarne Stroustrup wants standards body to respond to memory-safety push as Rust monsters lurk at the door

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Bybit declares war on North Korea's Lazarus crime-ring to regain $1.5B stolen from wallet

Up to $140M in bounty rewards for return of Ethereum allegedly pilfered by hermit nation

100-plus spies fired after NSA internal chat board used for kinky sex talk

National intel boss slams naughty nattering on work systems as 'egregious violation of trust'