Positive Technologies experts said that Neutrino’s operators changed their tactics and for more than a…
“This approach was so successful that the group soon got numerous imitators, and the name MageCart became a common name, and now it indicates a whole class of such attacks“, — say in Malwarebytes.
If in 2018 RiskIQ researchers identified 12 such groups, at the end of 2019, according to IBM, there were already about 40 of them. Hackers even inbuilt script Magecart to collect bulling information on Forbes subscription website.
Let me remind you that recently, Malwarebytes experts have already talked about the MageCart campaign, for which the hack group created a malicious site to host favicon and mask malicious code. A new expert report talks about similar malicious activity.
In an open directory of an unnamed compromised site, researchers were able to find a copy of the source code for the skimming kit, which allowed gathering a lot of new information and notice that the usual favicon.ico file contains an embedded script inside the Copyright field.
According to experts, the attack of cybercriminals has the following structure: the web skimmer was found in the metadata of the EXIF file, which was downloaded by hacked online stores with the WooCommerce plugin for WordPress on board. Extraneous code for downloading a dangerous image was added to a legitimate script, store owners themselves posted on websites.
It was possible to trace malicious activity to the site cddn[.]site, from which the malicious favicon file was downloaded. As it turned out, the attackers used favicon, identical to those in compromised stores, and the web skimmer was loaded from the Copyright field in the image metadata using the tag.
As you might guess, this web-skimmer, like other similar malware, stole the contents of input fields, where customers entered their name, billing address, credit card information and so on.
“When the information was collected, the skimmer encrypted the collected data, turned the line over and through the POST request sent the stolen information to the remote server as an image file”, – told Malwarebytes experts.
Obviously, the attackers decided to be consistent and used pictures to hide data at all stages of the attack.
Malwarebytes experts were also able to discover an early version of this skimmer, in which there was no obfuscation inherent in the latest iteration. In general, this version had the same functions, but studying behavior of both variations of the malware allowed concluding that this development may belong to the MageCart group number 9.
Kurlibat.xyz is a site that tries to trick you into clik to its browser notifications…
Initiateintenselyrenewedthe-file.top is a domain that tries to trick you into clik to its browser notifications…
Wotigorn.xyz is a site that tries to force you into subscribing to its browser notifications…
Initiateintenselyprogressivethe-file.top is a domain that tries to force you into clik to its browser notifications…
Nuesobatoxylors.co.in is a domain that tries to trick you into subscribing to its browser notifications…
Helistym.xyz is a site that tries to force you into clik to its browser notifications…