Hackers infect e-commerce sites by compromising their advertising partner

Haythem Elmir
0 1
Read Time2 Minute, 9 Second

Magecart strikes again, one of the most notorious hacking groups specializes in stealing credit card details from poorly-secured e-commerce websites.

According to security researchers from RiskIQ and Trend Micro, cybercriminals of a new subgroup of Magecart, labeled as « Magecart Group 12, » recently successfully compromised nearly 277 e-commerce websites by using supply-chain attacks.

Magecart is the same group of digital credit card skimmers which made headlines last year for carrying out attacks against some big businesses including Ticketmaster, British Airways, and Newegg.

Typically, the Magecart hackers compromise e-commerce sites and insert malicious JavaScript code into their checkout pages that silently captures payment information of customers making purchasing on the sites and then send it to the attacker’s remote server.

However, the researchers from the two firms today revealed that instead of directly compromising targeted websites, the Magecart Group 12 hacked and inserted its skimming code into a third-party JavaScript library, enabling all websites using that script to load the malicious code.

magecart hacking group

The third-party library targeted by Magecart Group 12 is by a French online advertising company, called Adverline, whose service is being used by hundreds of European e-commerce websites to display ads.

What’s more? Security researcher Yonathan Klijnsma at RiskIQ discovered that the skimmer code for MageCart Group 12 protects itself from de-obfuscation and analysis by performing an integrity check twice on itself.

Upon infection, the data-skimming code first checks if it is executed on an appropriate shopping cart web page. It does so by detecting related strings in the URL like ‘checkout,’ ‘billing,’ ‘purchase,’ ‘panier,’ which means ‘basket’ in French, and ‘kasse,’ which means ‘checkout’ in German.

magecart hacking group

Once it detects any of these strings in the URL, the script will start performing the skimming behavior by copying both the form name and values keyed in by the user on the webpage’s typing form.

The stolen payment and billing data are then stored in the JavaScript LocalStorage with the key name ‘Cache’ in Base64 format. To specify individual victims, the code also generates a random number which it reserves into LocalStorage with key name E-tag.

The researchers also published the IOCs associated with this Group 12’s operation, which includes the domains the skimmers used for injecting their code into the affected websites and receiving the stolen payment information.

Upon contacting, Adverline patched the issue immediately and removed the malicious code from its JavaScript library.

Source:https://thehackernews.com/2019/01/magecart-hacking-credit-cards.htmlHackers infect e-commerce sites by compromising their advertising partner

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

Flight Booking System Flaw Affected Customers of 141 Airlines Worldwide

Almost half of the fight travelers around the world were found exposed to a critical security vulnerability discovered in online flight ticket booking system that allowed remote hackers to access and modify their travel details and even claim their frequent flyer miles. Israeli network security researcher Noam Rotem discovered the […]