Cybercriminals managed to invade Magecart script on ForbesMagazine.com that is a resource for Forbes subscription.…
Previously, researchers found web skimmers inside images (site logos, favicons, social media buttons), in popular libraries including jQuery, Modernizr, and Google Tag Manager, or inside various widgets such as the support chat window.
Now, Willem de Groot, an expert at the Dutch company Sanguine Security, told ZDNet reporters that he had found web skimmers embedded in CSS files.
“After finding skimmers in SVG files last week, we now discovered a #magecart skimmer in perfectly valid CSS. It is parsed and executed during checkout. Malware loaded from cloud-iq[.]net (faking @cloudIQApps”, — wrote Willem de Groot on his company’s Twitter account.
The researcher notes that now CSS functionality significantly changed since 2000s. Over the past decade, CSS has evolved into a powerful tool that web developers now use to create serious animations with minimal use of JavaScript.
One of the more recent additions to CSS is a feature that allows loading and running JavaScript code using CSS rules. This is what hackers abuse. De Groot says there is at least one hack group injecting malware into CSS files, and this is usually a regular keylogger.
Several unnamed online stores have already been infected with this malware, and the cybercriminals’ infrastructure has been functioning since about September 2020, however, after a tweet from researchers about the problem, the keylogger seems to have been disabled. De Groot writes that it all looked like someone’s experiment.
While using CSS rules as a proxy for downloading malware is something new, the expert believes that this is not what site owners and buyers should worry about:
“While most research on skimming attacks is JavaScript, most skimming happens on the server side, where it is completely invisible. About 65% of our forensics research this year found skimmers on the server side, where they were hidden in databases, PHP code or Linux system processes.”
Let us recall even such a very impudent trick when attackers inbuilt script Magecart to collect bulling information on Forbes subscription website.
Chernars.com is a domain that tries to force you into subscribing to its browser notifications…
Eclipse-adblocker.pro is a site that tries to trick you into clik to its browser notifications…
Initiateadvancedcompletelythe-file.top is a site that tries to force you into subscribing to its browser notifications…
Pbmsoultions.com is a domain that tries to trick you into clik to its browser notifications…
Prizestash.com is a site that tries to trick you into subscribing to its browser notifications…
Verifiedbreaking.com is a domain that tries to force you into subscribing to its browser notifications…