The series of success from these attacks are indications that there will be lot more in the near future. The security firm group named IB has published a report that stated nearly 38 different JS-Sniffer families the researchers have documented after analyzing 2440 infected e-commerce websites. All of the JS-Sniffer families have been categorize in two parts where the first one is the universal code that can be integrated into any website like the G-Analytics and the WebRank families of JS-Sniffers. The second type of the JS-Sniffers include MagentoName, PreMage, Qoogle, FakeCDN, PostEval and GetBilling families taht have primarily been designed to work with the specific Content Management Systems like Magento, Woo-Commerce, Shopify, WordPress and OpenCart. The report also brings into limelight the growing trend in the underground forums of renting out JS-Sniffers as a service to the cybercriminals who do not have the technical expertise to do it on their own and makes it a great alternative money-making scheme to ransomware and the Cryptocurrency mining malware.