{"id":15186,"date":"2019-04-26T09:10:04","date_gmt":"2019-04-26T17:10:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/04\/26\/news-8935\/"},"modified":"2019-04-26T09:10:04","modified_gmt":"2019-04-26T17:10:04","slug":"news-8935","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/26\/news-8935\/","title":{"rendered":"GitHub hosted Magecart skimmer used against hundreds of e-commerce sites"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 26 Apr 2019 16:06:12 +0000<\/strong><\/p>\n<p>Every day, new e-commerce websites fall into the hands of one of the many Magecart skimmers. Unbeknownst to shoppers, criminals are harvesting their personal information, including payment details in the online equivalent of ATM card skimming.<\/p>\n<p>Most often the skimming code\u2014written in JavaScript and obfuscated\u2014is hosted on infrastructure controlled by attackers. Over time, they have created thousands of domain names mimicking Magento, the CMS platform that is by far most targeted.<\/p>\n<p>However, as we sometimes see in <a rel=\"noreferrer noopener\" aria-label=\"other types of compromises (opens in a new tab)\" href=\"https:\/\/blog.sucuri.net\/2017\/12\/malicious-cryptominers-from-github.html\" target=\"_blank\">other types of compromises<\/a>, threat actors can also abuse the resources of legitimate providers, such as code repository GitHub, <a href=\"https:\/\/blogs.microsoft.com\/blog\/2018\/10\/26\/microsoft-completes-github-acquisition\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"acquired by Microsoft (opens in a new tab)\">acquired by Microsoft<\/a> last year. <\/p>\n<p>This latest skimmer is a hex-encoded piece of JavaScript code that was uploaded to GitHub on April 20 by user <a rel=\"noreferrer noopener\" aria-label=\"momo33333 (opens in a new tab)\" href=\"https:\/\/github.com\/momo33333\" target=\"_blank\">momo33333<\/a>, who, as it happens, had just joined the platform on that day as well.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38397\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/attachment\/github_original\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original.png\" data-orig-size=\"843,837\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"github_original\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original-300x298.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original-600x596.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original.png\" alt=\"\" class=\"wp-image-38397\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original.png 843w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original-150x150.png 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original-300x298.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github_original-600x596.png 600w\" sizes=\"(max-width: 843px) 100vw, 843px\" \/><\/a><\/figure>\n<p>In the above and below screenshots, you can see that the threat actor was fine tuning the skimmer, after having done a few tests:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/update.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38399\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/attachment\/update-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/update.png\" data-orig-size=\"989,306\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"update\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/update-300x93.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/update-600x186.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/update.png\" alt=\"\" class=\"wp-image-38399\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/update.png 989w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/update-300x93.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/update-600x186.png 600w\" sizes=\"(max-width: 989px) 100vw, 989px\" \/><\/a><\/figure>\n<p>Just like with any other kind of third-party plugins, compromised Magento sites are loading this script within their source code, right after the CDATA script and\/or right before the &lt;\/html&gt; tag:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/sourcecode.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38395\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/attachment\/sourcecode-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/sourcecode.png\" data-orig-size=\"576,137\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sourcecode\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/sourcecode-300x71.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/sourcecode.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/sourcecode.png\" alt=\"\" class=\"wp-image-38395\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/sourcecode.png 576w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/sourcecode-300x71.png 300w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/><\/a><\/figure>\n<p>According to a <a rel=\"noreferrer noopener\" aria-label=\"search (opens in a new tab)\" href=\"https:\/\/urlscan.io\/search\/#%22raw.githubusercontent.com%5C%2Fmomo33333%5C%2Fmage%5C%2Fmaster%22\" target=\"_blank\">search<\/a> on urlscan.io, there are currently over 200 sites that have been injected with this skimmer:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/urlscanio.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38394\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/attachment\/urlscanio\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/urlscanio.png\" data-orig-size=\"1156,827\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"urlscanio\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/urlscanio-300x215.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/urlscanio-600x429.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/urlscanio.png\" alt=\"\" class=\"wp-image-38394\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/urlscanio.png 1156w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/urlscanio-300x215.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/urlscanio-600x429.png 600w\" sizes=\"(max-width: 1156px) 100vw, 1156px\" \/><\/a><\/figure>\n<p>A look at the deobfuscated script reveals the exfiltration domain (<em>jquerylol[.]ru<\/em>) where the stolen data will be sent to:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/decoded_.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38396\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/attachment\/decoded_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/decoded_.png\" data-orig-size=\"696,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"decoded_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/decoded_-300x181.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/decoded_-600x362.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/decoded_.png\" alt=\"\" class=\"wp-image-38396\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/decoded_.png 696w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/decoded_-300x181.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/decoded_-600x362.png 600w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/a><\/figure>\n<p>It&#8217;s worth noting that the compromised Magento sites will remain at risk, even if the GitHub-hosted skimmer is taken down. Indeed, attackers can easily re-infect them in the same manner they initially injected the first one.<\/p>\n<p>It is critical for e-commerce site owners to keep their CMS and its plugins up-to-date, as well as using secure authentication methods. Over the past year, we have identified thousands of sites that are hacked and posing a risk for online shoppers.<\/p>\n<p>We reported the fraudulent GitHub account which was quickly taken down. We are also protecting our users by blocking the exfiltration domain.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/\">GitHub hosted Magecart skimmer used against hundreds of e-commerce sites<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 26 Apr 2019 16:06:12 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/' title='GitHub hosted Magecart skimmer used against hundreds of e-commerce sites'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/shutterstock_1106278379.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Magecart threat actors upload their skimming code onto GitHub in the latest attack against Magento websites.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/github\/\" rel=\"tag\">GitHub<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magento\/\" rel=\"tag\">magento<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmer\/\" rel=\"tag\">skimmer<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/' title='GitHub hosted Magecart skimmer used against hundreds of e-commerce sites'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites\/\">GitHub hosted Magecart skimmer used against hundreds of e-commerce sites<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,11863,19622,12370,19623],"class_list":["post-15186","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-github","tag-magecart","tag-magento","tag-skimmer"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15186"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15186\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15186"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}