viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
Hundreds of e-commerce sites booby-trapped with payment card skimming malware
Technology

Hundreds of e-commerce sites booby-trapped with payment card skimming malware

11/02/2022

Stock photo of a woman using a laptop and a credit card to make a purchase.

About 500 e-commerce websites were recently found to be compromised by hackers who installed a credit card skimmer that surreptitiously stole sensitive data when visitors attempted to make a purchase.

A report published on Tuesday is only the latest one involving Magecart, an umbrella term given to competing crime groups that infect e-commerce sites with skimmers. Over the past few years, thousands of sites have been hit by exploits that cause them to run malicious code. When visitors enter payment card details during purchase, the code sends them to attacker-controlled servers.

Fraud courtesy of Naturalfreshmall[.]com

Sansec, the security firm that discovered the latest batch of infections, said the compromised sites were all loading malicious scripts hosted at the domain naturalfreshmall[.]com.

“The Natural Fresh skimmer shows a fake payment popup, defeating the security of a (PCI compliant) hosted payment form,” firm researchers wrote on Twitter. “Payments are sent to https://naturalfreshmall[.]com/payment/Payment.php.”

The hackers then modified existing files or planted new files that provided no fewer than 19 backdoors that the hackers could use to retain control over the sites in the event the malicious script was detected and removed and the vulnerable software was updated. The only way to fully disinfect the site is to identify and remove the backdoors before updating the vulnerable CMS that allowed the site to be hacked in the first place.

Sansec worked with the admins of hacked sites to determine the common entry point used by the attackers. The researchers eventually determined that the attackers combined a SQL injection exploit with a PHP object injection attack in a Magento plugin known as Quickview. The exploits allowed the attackers to execute malicious code directly on the web server.

Advertisement

They accomplished this code execution by abusing Quickview to add a validation rule to the customer_eav_attribute table and injecting a payload that tricked the host application into crafting a malicious object. Then, they signed up as a new user on the site.

“However, just adding it to the database will not run the code,” Sansec researchers explained. “Magento actually needs to unserialize the data. And there is the cleverness of this attack: by using the validation rules for new customers, the attacker can trigger an unserialize by simply browsing the Magento sign up page.”

It’s not hard to find sites that remain infected more than a week after Sansec first reported the campaign on Twitter. At the time this post was going live, Bedexpress[.]com continued to contain this HTML attribute, which pulls JavaScript from the rogue naturalfreshmall[.]com domain.

The hacked sites were running Magento 1, a version of the e-commerce platform that was retired in June 2020. The safer bet for any site still using this deprecated package is to upgrade to the latest version of Adobe Commerce. Another option is to install open source patches available for Magento 1 using either DIY software from the OpenMage project or with commercial support from Mage-One.

It’s generally hard for people to detect payment card skimmers without special training. One option is to use antivirus software such as Malwarebytes, which examines in real time the JavaScript being served on a visited website. People also may want to steer clear of sites that appear to be using outdated software, although that’s hardly a guarantee that the site is safe.

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

Apple’s MacBook Air, MacBook Pro, and Mac mini get M1 chips with 16 AI cores
In addition to announcing the release of macOS Big Sur …

Apple’s MacBook Air, MacBook Pro, and Mac mini get M1 chips with 16 AI cores

More than 20GB of Intel source code and proprietary data dumped online
Intel is investigating the purported leak of more than 20 …

More than 20GB of Intel source code and proprietary data dumped online

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • Nvidia CEO: Coronavirus caution shaves $100 million from Q1 expectations
    Nvidia CEO: Coronavirus caution shaves $100 million …
    14/02/2020
  • Brazil’s new fintech startup Cora raised $10 million on the strength of its founding team – TechCrunch
    Brazil’s new fintech startup Cora raised $10 …
    05/12/2019
  • Beat Saber is now an Oculus studio after Facebook acquisition
    Bandcamp is waiving fees today in support …
    01/05/2020
  • Rensselaer focuses IBM’s AiMOS supercomputer on machine learning
    IBM launches Weather Channel map to track …
    23/03/2020
  • MIT researchers find ‘systematic’ shortcomings in ImageNet data set
    AI research finds a ‘compute divide’ concentrates …
    11/11/2020

Popular Posts

  • Omnipotent BMCs from QCT remain vulnerable to critical Pantsdown threat
    Omnipotent BMCs from QCT remain vulnerable to …
    26/05/2022 0
  • Russia wages “relentless and destructive” cyberattacks to bolster Ukraine invasion
    Russia wages “relentless and destructive” cyberattacks to …
    27/04/2022 0
  • 10 of the Most Random Reality Shows …
    28/04/2022 0
  • 10 More Modern Conveniences That Met with …
    28/04/2022 0
  • One of the most powerful DDoSes ever targets cryptocurrency platform
    One of the most powerful DDoSes ever …
    28/04/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh