# Sucuri Blog **[blog.sucuri.net/2021/07/stylish-magento-card-stealer-loads-without-script-tags.html](https://blog.sucuri.net/2021/07/stylish-magento-card-stealer-loads-without-script-tags.html)** Ben Martin July 28, 2021 Recently one of our analysts, Weston H., found a very interesting credit card stealer in a Magento environment which loads a malicious JavaScript without using any script tags. In this post I will go over how it was found, how to decode it and how it works! One of our clients was reporting that one of their website visitors was receiving a warning from their antivirus program when navigating to their checkout page: ----- [Calls were being made to a known malicious domain that was already blacklisted by multiple](https://labs.sucuri.net/blacklist/info/?domain=siteanalitic.space) vendors for distributing malware and involvement in carding attacks: This certainly indicated that a card stealer was present somewhere on our client’s website. ## Credit Card Stealer in a Magento Website In a previous [post I outlined the different types of card stealers that can infect ecommerce](https://blog.sucuri.net/2021/06/credit-card-theft-types-of-swipers.html) websites. PHP, being a server side programming language, cannot be seen directly by antivirus programs so this infection must be JavaScript and visible to the browser. Our first step in locating such an infection is to query the database for the following string: ```