Skip to content

New Zealand E-commerce Store CMS Admin Access Allegedly for Sale with Active Payment Redirect

Dark Web Informer - Cyber Threat Intelligence

New Zealand E-commerce Store CMS Admin Access Allegedly for Sale with Active Payment Redirect

New Zealand
E-commerce & Online Stores

🧩 Standalone API Access Now Available

Access high-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.

View API Access

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)
Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)
Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat Feed
Live tracking with JSON export.
🔍
Leak and Breach Coverage
Direct access to claims and posts.
📡
Snippets and Quick Facts
Concise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet Resources
Verified index of dark web sites and services.
📊
Real Time Uptime Dashboard
Live status of 500+ sites.
🤖
Whiteintel.io API
Integrated checks inside breach posts.
🖼️
High Resolution Images
Uncompressed, watermark free evidence.
🔑
Keyword Notifications
Browser alerts for tracked terms.

Quick Facts

Date and Time of Alert
2026-01-27 03:54:01 UTC
Threat Actor
markopollo
Victim Country
New Zealand
Industry
E-commerce & Online Stores
Victim Org.
Unknown
Victim Site
Unknown
Category
Initial Access (Auction)
Severity
Medium
Network
Clear Web
Access Type
CMS Admin + Payment Redirect
Total Orders
4,400 (Oct 2025 - Jan 2026)
January Orders
800+
Start Price
$1,500 USD
Blitz Price
$5,000 USD

Incident Overview

A threat actor operating under the handle "markopollo" is auctioning unauthorized CMS administrator access to an unidentified New Zealand-based online shop on the Exploit forum. According to the listing, the access includes a "CMS recorder" and admin-level privileges to the shop's content management system. The threat actor claims the shop has processed 4,400 orders between October 1, 2025 and January 27, 2026, with 800+ orders in January 2026 alone.

The listing indicates that a payment redirection mechanism has been deployed on the compromised store, capable of intercepting payments through Afterpay, internet banking, and credit card transactions. The threat actor notes that payments are "mostly paid by SS" (likely referring to a payment processor or screenshot verification). The auction starts at $1,500 USD with a $250 step increment and a blitz (buy-it-now) price of $5,000 USD. The auction runs for 12 hours after the last bid or blitz purchase, with Guarantor+ escrow protection.

This post is for subscribers on the Plus, Pro and Elite tiers

Subscribe

Already have an account? Sign In

Latest