Connect with us

Technology

Hackers target online stores with new attack

Published

on

Hackers target online stores with new attack

NEWYou can now listen to Fox News articles!

A security researcher found a serious weakness in the software that powers thousands of e-commerce sites. The platform, called Magento, and its paid version Adobe Commerce, has a bug that lets attackers break into active shopping sessions. Some attackers can even take control of the entire store.

The flaw is known as SessionReaper. It allows hackers to pretend they are real customers without needing a password. Once they are inside, they can steal data, make fake orders, or install tools that collect credit card details.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Why is this attack so serious?

The problem starts in the part of the system that handles how a store communicates with other online services. Because the software does not properly check the information it receives, it sometimes trusts data that it should not. Hackers take advantage of this by sending fake session files that the store accepts as real.

Advertisement

Researchers at SecPod warn that successful attacks can lead to stolen customer data, fake purchases and even full control of the store’s server.

Once the attack method was shared publicly, cybercriminals began using it right away. Security experts at Sansec reported that more than 250 online stores were compromised within a single day. This shows how quickly attacks can spread once a vulnerability becomes public.

Hackers are exploiting a new flaw called SessionReaper to hijack active shopping sessions on thousands of e-commerce sites running Adobe Commerce and Magento. (Kurt Knutsson)

Why are many stores still unprotected?

Adobe released a security update on Sept. 9 to fix the issue. Weeks later, about 62% of affected stores still have not installed it. Some store owners are afraid an update might break features on their site. Others simply do not know how serious the risk is.

Every unpatched store remains an open door for attackers who want to steal information or install malicious code.

Advertisement

MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

How can you stay safe when shopping online?

While store owners are responsible for fixing the problem, you can still take smart steps to protect yourself when shopping online. These actions can help you spot danger early and keep your personal information safe.

1) Look for warning signs

Always pay attention to how a website behaves. If a page looks odd, loads slowly or shows error messages, it could mean something is wrong behind the scenes. Check for the small padlock symbol in the address bar that shows the site uses HTTPS encryption. If it is missing or the site redirects you to an unfamiliar page, stop and close the browser tab immediately. Trust your instincts if something feels off.

2) Be careful with email links and use a data removal service 

Cybercriminals often use fake promotional emails or ads that look like real store offers. Instead of clicking links in messages or banners, type the store’s web address directly into your browser to avoid phishing pages designed to steal your login details or card information. Since attacks like SessionReaper can expose your personal data to criminal marketplaces, consider using a reputable data removal service that continuously scans and deletes your private information, such as your address, phone number and email, from data broker sites. This reduces your risk of identity theft if your information has been leaked through a compromised online store.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Advertisement

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Cybersecurity teams at SecPod and Sansec tracked more than 250 stores breached within 24 hours of the exploit going public, showing how fast these attacks spread. (Kurt “CyberGuy” Knutsson)

3) Use strong antivirus software

Strong antivirus protection is your silent guard online. Choose reputable software that offers real-time protection, safe browsing alerts and automatic updates. A strong antivirus program can detect malicious code that tries to run on your device, block unsafe sites and alert you to potential threats. This adds another crucial layer of defense when visiting online stores that may not be fully secure.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Advertisement

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 

4) Use safe payment options

Whenever possible, choose payment services that add an extra layer of protection between your bank account and the online store. Platforms like PayPal, Apple Pay or Google Pay do not share your card number with the retailer. This reduces the chance of your information being stolen if the store is compromised. These payment gateways also offer dispute protection if a purchase turns out to be fraudulent.

5) Shop with trusted retailers

Stick to stores with a solid reputation. Well-known brands usually have better security and faster response times when issues arise. Before buying from a new website, check its reviews on trusted consumer sites. Look for signs of credibility such as clear contact information, a professional design and verified payment options. A few minutes of research can save you from weeks of frustration.

TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

6) Keep your devices updated

Updates may seem annoying, but they are one of the most effective ways to protect your data. Make sure your computer, smartphone and web browser all have the latest security patches installed. Updates often fix the exact kinds of flaws hackers use to spread attacks like SessionReaper. Enable automatic updates if you can, so your devices stay protected without extra effort.

Advertisement

7) Use unique, strong passwords

If you create accounts on shopping sites, make sure each one has its own strong password. Avoid using the same password across multiple platforms. Consider using a password manager to generate and store long, random passwords. That way, if one account is compromised, your other logins stay safe.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

8) Turn on two-factor authentication

If a site or payment service offers two-factor authentication, enable it. This adds a second security step, such as a code sent to your phone or generated by an app. Even if hackers steal your password, they will not be able to access your account without that second verification.

Even weeks after Adobe issued a critical patch for the SessionReaper vulnerability, nearly two-thirds of affected online stores remain unprotected, leaving customer data and payment information at high risk of theft. (CyberGuy.com)

Advertisement

9) Avoid public Wi-Fi for purchases

FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

Public Wi-Fi networks in places like cafés, airports and hotels are often unsecured. Avoid entering payment information or logging in to accounts while connected to public networks. If you must make a purchase while away from home, use a mobile data connection or a reliable VPN to encrypt your activity. 

10) Monitor your bank and credit statements

Check your financial statements regularly for any unusual activity. Small, unauthorized charges can be early signs of fraud. Report any suspicious transactions to your bank or credit card company right away so they can freeze your account or issue a new card.

11) Report suspicious activity

If you notice anything strange during or after an online purchase, act quickly. Contact the store’s customer service to report what you saw. You should also inform your payment provider or credit card company so they can block unauthorized transactions. Reporting early can help stop further damage and alert other shoppers to potential risks.

Kurt’s key takeaways

The SessionReaper attack shows how fast online threats can appear and how long they can linger when updates are ignored. Even well-known stores can become unsafe overnight. For retailers, installing patches quickly is critical. For shoppers, staying alert and choosing secure payment methods are the best ways to stay protected.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Would you still shop online if you knew hackers could be hiding behind a store’s checkout page? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com. All rights reserved.  

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Snap, YouTube, and TikTok settle suit over harm to students

Published

on

Snap, YouTube, and TikTok settle suit over harm to students

Snap, YouTube, and TikTok have settled the first lawsuit of its kind, alleging that social media addiction has cost public schools massive amounts of money, according to Bloomberg. The suit, filed by the Breathitt County School District in Kentucky, claims that social media has disrupted learning and created a mental health crisis, straining budgets. The terms of the settlement have not been revealed yet, and Meta is still facing a trial in the same suit, which is viewed as a bellwether for over 1,000 similar lawsuits across the country

This follows an earlier case, settled by Snap and TikTok, in which a 19-year-old plaintiff claimed significant personal injury due to addictive social media apps. Google and Meta did not agree to a settlement in that suit, and it eventually went to trial, where a jury awarded the plaintiff $6 million. Meta also recently lost a suit brought by New Mexico’s Attorney General, to the tune of $375 million.

Beyond monetary awards, many, including New Mexico, are pushing for significant changes to social media apps to limit their harm to minors. And this is just the start of what’s shaping up to be a busy year for social media lawsuits. According to Bloomberg, lawyers representing school districts said their “focus remains on pursuing justice for the remaining 1,200 school districts who have filed cases.”

Continue Reading

Technology

Missed voicemails with no calls? It could be a scam

Published

on

Missed voicemails with no calls? It could be a scam

NEWYou can now listen to Fox News articles!

It starts quietly. Your phone buzzes. You see a voicemail notification. But your phone never rang. Then it happens again. And again. Before long, your voicemail inbox looks like it’s under attack.

That’s exactly what Mike from Westport, CT, is dealing with right now. He wrote to us saying,

“I am so upset. Every 20 to 30 minutes, I am getting voicemails, but what’s weird is my phone never rings. After blocking the number, it just rolls over to a new source number. When I go to play the message, there is no audio. Is this a scammer just trying to get me to call them back? Not sure what the endgame is here. What can I do to stop this from happening? I really appreciate your help.”

What he is describing is something we’re seeing more often. It may feel random, but there’s a clear pattern behind this voicemail scam and here’s what you need to know to stay safe.

Advertisement

RECEIVING UNEXPECTED INTERNATIONAL CALLS? WHAT YOU NEED TO KNOW

Silent voicemail scams can flood a phone with blank messages even when the device never rings. (Getty Images)

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

What the silent voicemail scam actually is

This tactic is often called a silent voicemail scam or ringless voicemail spam. Here’s how it works in plain terms:

  • Scammers drop voicemail messages directly into your inbox
  • Your phone never rings, so it feels strange and urgent
  • The message is blank, garbled or extremely short
  • The number changes constantly to avoid blocks

At first glance, it looks like a glitch. That confusion is the point.

What’s really happening behind the scenes

This pattern almost always points to automated robocall systems using caller ID spoofing, not real people manually calling you.

Here’s what’s likely happening:

Advertisement
  • Automated dialing systems are repeatedly hitting your number
  • They use spoofed or constantly changing caller IDs, which is why blocking one number doesn’t stop it
  • Some calls connect briefly, then drop, leaving behind a silent or very short voicemail
  • In some cases, the system is “pinging” your number to confirm it’s active

Once a number is confirmed as active, it can be shared across spam networks and used in future campaigns.

Why scammers leave empty voicemails

It seems pointless, but there’s a strategy behind it.

1) They want you to call back

Curiosity does the work for them. Many people return the call just to figure out what happened. When you call back, you may:

  • Reach a premium-rate number that charges per minute
  • Get routed into a scam call center
  • Confirm your number is active and monitored

2) They test if your number is real

Even if you never call back, your voicemail confirms your number is in use. That makes it more valuable for future scams.

3) They try to bypass spam filters

Because your phone never rings, traditional call filters may not catch it. That lets more of these messages slip through.

Why do the numbers keep changing

You block one number, and another appears minutes later. That’s usually a sign of caller ID spoofing and number cycling. Scammers use software to falsify the number that shows up on your phone and rotate through large batches of numbers to stay ahead of blocks and spam filters. Some of those numbers may be completely fabricated, while others may belong to real people whose caller ID information is being misused. Many of those numbers are:

  • Fake
  • Reassigned or temporarily used
  • Tied to real people who have no idea their number is being spoofed

Blocking a single number can still be worth doing, but it usually will not stop the campaign by itself because the caller can keep switching numbers. 

GOOGLE SEARCH LED TO A COSTLY SCAM CALL

Advertisement

Scammers may use ringless voicemail spam and caller ID spoofing to test whether a phone number is active. (Getty Images)

Is your phone being hacked?

This is one of the first things many people worry about. In most cases, no. These silent voicemails are more likely to be part of a scam call or robocall campaign than a sign that your phone has been hacked. Scammers can use tactics such as caller ID spoofing and ringless voicemail to reach you without making the call feel normal.

The bigger risk isn’t your phone itself. It’s how the scam tries to get you to respond. Calling back, pressing prompts or engaging with the message can confirm that your number is active and may expose you to more scam attempts. The FTC specifically advises people to hang up or delete the voicemail and not call back unknown numbers.

How to stop silent voicemail scams

You don’t have to just put up with it. There are ways to reduce or stop these messages. 

1) Do not call back unknown numbers

Even if it feels harmless, skip it. If it’s important, the caller will leave a real message.

Advertisement

2) Enable spam call filtering

On iPhone and Android, turn on built-in call filtering and silence unknown callers. This helps reduce future attempts.

How to enable spam call filtering 

On iPhone (latest iOS)

Apple now gives you two strong options: Silence Unknown Callers and Call Screening.

Option 1: Silence unknown callers

Advertisement
  • Open Settings
  • Tap Apps
  • Tap Phone
  • Scroll down and turn on Unknown Callers

This sends calls from numbers not in your contacts straight to voicemail without ringing.

Option 2: Turn on Call Screening (recommended)

  • Open Settings
  • Tap Apps
  • Tap Phone
  • Scroll down and under Screen Unknown Callers, select Ask Reason for Calling

This feature prompts unknown callers to say who they are before your phone rings, which filters out many spam calls automatically.

Optional: Enable spam identification

  • Go to Settings
  • Tap Apps
  • Tap Phone
  • Tap Call Blocking & Identification
  • Tap Business Call Identification
  • Make sure it is set to ON

This allows your iPhone to show verified business names and logos for legitimate callers when available.

On Samsung 

Samsung combines spam protection with AI call screening.

Settings and feature names may vary depending on your Samsung model, carrier and software version.

Advertisement

Option 1: Turn on spam protection

  • Open the Phone app
  • Tap the three-dot menu (top right)
  • Tap Settings
  • Tap Caller ID and spam protection
  • Toggle it ON

This flags suspected spam calls before you answer.

Option 2: Block unknown callers

  • Open the Phone app
  • Tap the three-dot menu (top right) 
  • Tap Settings
  • Tap Block numbers
  • Turn on Block calls from unknown numbers 

This stops hidden or unidentified numbers from ringing your phone.

Option 3: Enable Call Screen (best option)

  • Open the Phone app
  • Tap the three-dot menu (top right)
  • Tap Settings
  • Tap Bixby Text Call or just Text Call
  • Toggle it ON

This lets your phone answer unknown calls with AI and show you what the caller says in real time.

One important reality check: Even with these turned on, some calls may still go to voicemail. That’s because voicemail is controlled by your carrier, not your phone.

HOW TO STOP SPAM MAIL, POLITICAL TEXTS AND EMAIL SPAM FOR GOOD

Advertisement

Unknown voicemail messages that contain no audio may be part of an automated robocall campaign. (Kurt “CyberGuy” Knutsson)

3) Use a call-blocking app

Apps can spot patterns faster than manual blocking and stop repeat offenders. Many of these apps can also identify known scam numbers and automatically block high-risk calls, helping reduce how often your phone gets hit.

4) Contact your carrier

Many carriers offer network-level spam blocking. Ask about tools that block ringless voicemail or robocalls.

5)  Use a data removal service

If your number keeps getting hit, it may already be circulating on marketing lists or data broker sites. These data removal services scan for your personal information and help remove it from databases that scammers often tap into. Cutting down where your number appears can reduce how often you get targeted over time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

6) Report the activity

You can report unwanted calls and voicemails to the Federal Trade Commission at reportfraud.ftc.gov or by calling 1-877-FTC-HELP (1-877-382-4357). Reports help track and shut down large scam campaigns.

Advertisement

7) Protect your number going forward

Avoid posting your phone number publicly. The less exposure it has, the harder it is for scammers to target you.

8) Register your phone number on the National Do Not Call Registry at donotcall.gov/

This can help reduce telemarketing calls from legitimate businesses, but it unfortunately won’t stop scammers, illegal robocalls, or exempt organizations (like charities and political groups) from calling you. Scammers often ignore the registry and use tactics like number spoofing to bypass it. Want to know more about why your phone still won’t stop ringing and what you can do about it?  Check out our article on the ‘Do Not Call’ list loophole.

Kurt’s key takeaways

Silent voicemails are designed to mess with your instincts. They rely on curiosity and confusion, not sophisticated hacking. The best move is simple. Don’t engage. Let them hit a dead end. Over time, that tells the system your number isn’t worth the effort.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

So here’s the real question: If scammers are counting on curiosity to hook you, how often do you think that instinct is working on other people right now? Let us know by writing to us at Cyberguy.com

Advertisement

 Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Xbox is now XBOX

Published

on

Xbox is now XBOX

Xbox just allcapsmaxxed: Meet XBOX. This isn’t a joke; Microsoft appears to be actually rebranding Xbox to XBOX. Asha Sharma, Xbox CEO, ran a poll on X earlier this week, asking fans whether Microsoft should use Xbox or XBOX. The results were in favor of XBOX, and the company has now renamed its X account.

Curiously, the Threads and Bluesky accounts for Xbox haven’t been renamed yet, but if Microsoft is going ahead with a rebranding then I expect those will change soon. I asked Microsoft to comment on this potential Xbox rebranding and the company simply referred me to Sharma’s post.

The use of all caps for Xbox is a return to original form, though. Microsoft’s first Xbox logo for its console was all caps, and the company has favored using similar capped versions for the Xbox 360, Xbox One, and Xbox Series X / S console logos.

The apparent rebranding comes just a few weeks after Sharma scrapped Microsoft Gaming and renamed Microsoft’s gaming division back to Xbox. It’s part of Sharma’s continued promise of a “return of Xbox,” which has involved fan-focused console updates, a new Xbox logo, Game Pass pricing changes, and lots more in recent weeks.

Continue Reading
Advertisement

Trending