Continuing with their invasive strategies, the e-commerce predator Magecart has developed another malicious feature. As observed, the latest Magecart skimmer evades detection by hiding stolen data in JPG image files. Magecart Hiding Stolen Data In JPG Files Researchers from Sucuri have observed new Magecart skimmer that has adopted a new evasive strategy. As elaborated in their post, they found Magecart skimmer active on Magento 2 websites hiding stolen data in JPG files. The researchers noticed the malicious code injected into the checkout page where it captured POST request data from the customers. The same code also created .jpg files to which it then stored the stolen information.