← Supply-Chain Attack Compendium

Picreel (via pop-up script)

Incident Summary

Picreel pop-up script delivered skimmer.

Picreel, a service for conversion tools such as exit pop-ups, had its hosted JavaScript compromised. Attackers modified the script served to customer sites and injected a credit card skimmer, turning a marketing widget into payment-card theft wherever clients embedded it.

Date
2019-01-01 to 2019-05-01
Category
Commercial
Target Surface
Distribution
Insertion Phase
dependency
Impact
Credential theft
Cause
Compromised third-party script

What Was Affected

Package Picreel (via pop-up script)
LanguageJavaScript
ComponentScript
Artifact typesource archive
Domain typeproject download host
Domain picreel.com

Incident Context

Motive
Financial gain
Attribution
Cybercriminal Gang
Transitive
Yes
Observed Duration
120 days

Evidence

Compromised Artifacts

  • Compromised JavaScript files served by Picreel to its clients via picreel.com, active around early 2019.

Current Artifacts and Analysis

External References

Source Data

Source record: proprietary/picreel/meta.yaml