This report discusses the automated Magecart campaign cyberattack that occurred between January and July 2019, which breached over 960 e-commerce stores. The report details the payment card skimming issue, where Magecart groups injected malware to steal payment data. The attack involved injecting customized JavaScript into websites to create fake credit card payment sections, leading to data breaches including cardholder names, phone numbers, and billing addresses. The report highlights the need for PCI DSS compliance and intrusion protection systems to mitigate such threats. It emphasizes the importance of understanding merchant responsibilities for enhancing infrastructure robustness. The report concludes that the automated Magecart campaign poses a significant threat to business management, emphasizing the need for PCI DSS compliance and NNT implementation to address data breaches. The report provides references to support the findings and analysis of the cyberattack.