{"id":15827,"date":"2019-07-18T08:10:03","date_gmt":"2019-07-18T16:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/18\/news-9574\/"},"modified":"2019-07-18T08:10:03","modified_gmt":"2019-07-18T16:10:03","slug":"news-9574","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/18\/news-9574\/","title":{"rendered":"No man&#8217;s land: How a Magecart group is running a web skimming operation from a war zone"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Thu, 18 Jul 2019 15:00:13 +0000<\/strong><\/p>\n<p>Our Threat Intelligence team has been monitoring the activities of a number of threat actors involved in the theft of credit card data. Often referred to under the Magecart moniker, these groups use simple pieces of JavaScript code (skimmers) typically injected into compromised e-commerce websites to steal data typed by unaware shoppers as they make their purchase.<\/p>\n<p>During the course of an investigation into one campaign, we noticed the threat actors had taken some additional precautions to avoid disruption or takedowns. As such, we decided to have a deeper look into the bulletproof techniques and services offered by their hosting company.<\/p>\n<p>What we found is an ideal breeding ground where criminals can operate with total impunity from law enforcement or actions from the security community.<\/p>\n<h3>The setup<\/h3>\n<p>Using servers hosted in battle-scarred Luhansk (also known as Lugansk), Ukraine, Magecart operators are able to operate outside the long arm of the law to conduct their web-skimming business, collecting a slew of information in addition to credit card details before it is all sent to &#8220;exfiltration gates.&#8221; Those web servers are set up to receive the stolen data so that the cards can be processed and eventually resold in underground forums.<\/p>\n<p>We will take you through analysis of the skimmer, exfiltration gate, and hosting servers to show how this Magecart group operates, and which measures we are taking to protect our customers.<\/p>\n<h3 id=\"mce_29\">Skimmer analysis<\/h3>\n<p>The skimmer is injected into compromised Magento sites and trying to pass itself for Google Analytics (google-anaiytic[.]com), a domain previously associated with the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/visiondirect-data-breach-caused-by-magecart-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">VisionDirect data breach<\/a>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38703\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/skimmer01\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer01.png\" data-orig-size=\"597,532\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"skimmer01\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer01-300x267.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer01.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer01.png\" alt=\"\" class=\"wp-image-38703\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer01.png 597w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer01-300x267.png 300w\" sizes=\"(max-width: 597px) 100vw, 597px\" \/><\/figure>\n<\/div>\n<p>Each hacked online store has its own skimmer located in a specific directory named after the site&#8217;s domain name. We also discovered a tar.gz archive perhaps left behind by mistake containing the usernames and passwords needed to login into hundreds of Magento sites. These are the same sites that have been injected with this skimmer.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39527\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/hacked_sites-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/hacked_sites.png\" data-orig-size=\"474,633\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"hacked_sites\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/hacked_sites-225x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/hacked_sites-449x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/hacked_sites.png\" alt=\"\" class=\"wp-image-39527\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/hacked_sites.png 474w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/hacked_sites-225x300.png 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/hacked_sites-449x600.png 449w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/figure>\n<\/div>\n<p>Looking for additional <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/OSINT.png\" target=\"_blank\" data-rel=\"lightbox-0\" title=\"\">OSINT<\/a>, we were able to find a <a href=\"http:\/\/ddecode.com\/hexdecoder\/?results=1370cbb926ab4cc9a3089cc1e8bbcf30\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"PHP backdoor (opens in a new tab)\">PHP backdoor<\/a> that we believe is being used on those hacked sites. It includes several additional shell scripts and perhaps skimmers as well (snif1.txt):<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39531\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/backdoor-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/backdoor.png\" data-orig-size=\"951,569\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"backdoor\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/backdoor-300x179.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/backdoor-600x359.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/backdoor.png\" alt=\"\" class=\"wp-image-39531\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/backdoor.png 951w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/backdoor-300x179.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/backdoor-600x359.png 600w\" sizes=\"(max-width: 951px) 100vw, 951px\" \/><\/figure>\n<\/div>\n<p>In the next step of our analysis, we will be looking at the exfiltration gate used to send the stolen data back to the criminals. This is an essential part that defines every skimmer and can help us better understand their backend infrastructure.<\/p>\n<h3>Exfiltration gate<\/h3>\n<p>A closer look at the skimmer code reveals the exfiltration gate (google.ssl.lnfo[.]cc), which is another Google lookalike.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer02.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38704\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/skimmer02\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer02.png\" data-orig-size=\"663,742\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"skimmer02\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer02-268x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer02-536x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer02.png\" alt=\"\" class=\"wp-image-38704\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer02.png 663w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer02-268x300.png 268w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer02-536x600.png 536w\" sizes=\"(max-width: 663px) 100vw, 663px\" \/><\/a><\/figure>\n<\/div>\n<p>The stolen data is Base64 encoded and sent to the exfiltration server via a GET request that looks like this:<\/p>\n<pre class=\"wp-block-preformatted\">GET \/fonts.googleapis\/savePing\/?hash=udHJ5IjoiVVMiLCJsb2dpbjpndWVzdCXN0Iiw{trimmed}<br \/><\/pre>\n<p>The crooks will receive the data as a JSON file where each field contains the victim&#8217;s personal information in clear text: <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/JSON_.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38707\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/json_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/JSON_.png\" data-orig-size=\"298,480\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"JSON_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/JSON_-186x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/JSON_.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/JSON_.png\" alt=\"\" class=\"wp-image-38707\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/JSON_.png 298w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/JSON_-186x300.png 186w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/><\/a><\/figure>\n<\/div>\n<p>The primary target here is the credit card information that can be immediately monetized. However, as seen above, skimmers can also collect much more data, which unlike requesting a new credit card, is much more problematic to deal with. Indeed, names, addresses, phone numbers, and emails are extremely valuable data points for the purposes of <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/09\/equifax-aftermath-how-to-protect-against-identity-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"identity theft  (opens in a new tab)\">identity theft <\/a>or spear phishing attacks.<\/p>\n<h3>Panel and bulletproof hosting<\/h3>\n<p>A closer look at the exfiltration gate reveals the login panel for this skimmer kit. It&#8217;s worth noting that both <em>google.ssl.lnfo[.]cc<\/em> and <em>lnfo[.]cc<\/em> redirect to the same login page.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer03.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38705\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/skimmer03\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer03.png\" data-orig-size=\"631,536\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"skimmer03\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer03-300x255.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer03-600x510.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer03-600x510.png\" alt=\"\" class=\"wp-image-38705\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer03-600x510.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer03-300x255.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/skimmer03.png 631w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/figure>\n<\/div>\n<p>lnfo[.]cc is utilizing name services provided by 1984 Hosting, an Iceland-based hosting provider that &#8220;<em>will always go the extra mile to protect our customers&#8217; civil rights, including the freedom of expression, the freedom of the press, the right to anonymity and privacy.<\/em>&#8221; It&#8217;s quite likely the threat actors may be taking advantage of it.<\/p>\n<p>The corresponding hosting server (176.119.1[.]92) is located in Luhansk (also known as Lugansk), Ukraine.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39587\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/map_luhansk\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/map_luhansk.png\" data-orig-size=\"642,579\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"map_luhansk\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/map_luhansk-300x271.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/map_luhansk-600x541.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/map_luhansk.png\" alt=\"\" class=\"wp-image-39587\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/map_luhansk.png 642w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/map_luhansk-300x271.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/map_luhansk-600x541.png 600w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/><\/figure>\n<\/div>\n<p>A little bit of research on this city shows it is the capital of the unrecognized <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Luhansk_People%27s_Republic\" target=\"_blank\">Luhansk People&#8217;s Republic<\/a> (LPR), which declared its independence from Ukraine following the <a rel=\"noreferrer noopener\" aria-label=\"2014 revolution (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/2014_Ukrainian_revolution\" target=\"_blank\">2014 revolution<\/a> ignited by the conflict between pro-European and pro-Russian supporters. It is part of a region also known as Donbass that has been the theater for an intense and ongoing <a rel=\"noreferrer noopener\" aria-label=\"war (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/War_in_Donbass\" target=\"_blank\">war<\/a> that has cost thousands of lives.<\/p>\n<p>Amid this chaos, opportunists are offering up bulletproof hosting services for &#8220;grey projects&#8221; safe from the reach of European and American law enforcement. This is the case of bproof[.]host at 176.119.1[.]89, which advertises bulletproof IT services with VPS and dedicated servers in a private data center.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39516\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/bproof\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/bproof.png\" data-orig-size=\"1004,603\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bproof\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/bproof-300x180.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/bproof-600x360.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/bproof.png\" alt=\"\" class=\"wp-image-39516\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/bproof.png 1004w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/bproof-300x180.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/bproof-600x360.png 600w\" sizes=\"(max-width: 1004px) 100vw, 1004px\" \/><\/figure>\n<\/div>\n<h3>A host ripe with malware, skimmers, phishing domains<\/h3>\n<p>Choosing the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Autonomous_system_(Internet)\" target=\"_blank\">ASN<\/a> AS58271 &#8220;FOP Gubina Lubov Petrivna&#8221; located in Luhansk is no coincidence for the Magecart group behind this skimmer. In fact, on the same ASN at 176.119.1[.]70 is also <a rel=\"noreferrer noopener\" aria-label=\"another skimmer (opens in a new tab)\" href=\"https:\/\/urlscan.io\/result\/a1f1140d-ced0-4531-ac1b-a38289bd6703\/dom\/\" target=\"_blank\">another skimmer<\/a> (xn--google-analytcs-xpb[.]com) using an <a rel=\"noreferrer noopener\" aria-label=\"internationalized domain name (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Internationalized_domain_name\" target=\"_blank\">internationalized domain name<\/a> (IDN) that ties back to that same exfiltration gate.<\/p>\n<p>In addition, that ASN is a hotspot for IDN-based phishing, in particular around cryptocurrency assets:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39537\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/attachment\/idn_phish\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/IDN_phish.png\" data-orig-size=\"642,396\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"IDN_phish\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/IDN_phish-300x185.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/IDN_phish-600x370.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/IDN_phish.png\" alt=\"\" class=\"wp-image-39537\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/IDN_phish.png 642w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/IDN_phish-300x185.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/IDN_phish-600x370.png 600w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/><\/figure>\n<\/div>\n<p>Bulletproof hosting services have long been a staple of cybercrime. For instance, the infamous <a rel=\"noreferrer noopener\" aria-label=\"Russian Business Network (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Russian_Business_Network\" target=\"_blank\">Russian Business Network<\/a> (RBN) ran a variety of malicious activities for a number of years.<\/p>\n<p>Due to the very nature of such hosts, takedown operations are difficult. It&#8217;s not simply a case of a provider turning a blind eye on shady operations, but rather it is the core of their business model.<\/p>\n<p>To protect our users against these threats, we are blocking all the domains and IP addresses we can find associated with skimmers and malware in general. We are also reporting the compromised Magento stores to their respective registrars\/hosts. <\/p>\n<h3>Indicators of Compromise<\/h3>\n<p><strong>Skimmers (hosts)<\/strong><br \/>google-anaiytic[.]com (176.119.1[.]72)<br \/>xn--google-analytcs-xpb[.]com (176.119.1[.]70)<\/p>\n<p><strong>Skimmers (exfiltration gate\/panel)<\/strong><br \/>google.ssl.lnfo[.]cc (176.119.1[.]92)<\/p>\n<p><strong>Skimmers (JavaScript)<\/strong><br \/>2cf2d3608a3e5dc2e0629bc80b5c3f11007608a1e6a3159931bb403f2a2ae09b<br \/>687a0deb72c250a24245e68101f2bd1acc377fc90ac22140f5cca9f515fc3914<br \/>7a20d0a5d8397624623e0a27d93c8741c187249d78e8f6d9dcad45010293d300<br \/>d5cbb9011352525a607c430c338a68a0a39d172940f03bb81b3bdaba91cb0e66<br \/>757df530dffe4b303399421ea0c53eb1723ba413585ef4ede804aaffed5cc3c1<br \/>f4fad9c9018befdaa455b6c248dd7fc017ed32f69123b6a1d04b4a2e44d69b25<br \/>37aac00b65d009fb8899f129a82ee3480640f50253ee0ff934ad25b9089254f2<br \/>c399a312c842494f81438d4510f8a7e6721912eb319a57e3d1ab34937f9dc29f<br \/>209bc0b8274cac2ed00c1fab4546cb6ab11f118497c71698b0317dc12ac68afa<br \/>12ac099a2169734b395a2519bcb783696ec46c10a6cde0ee1ad3262876336cf6<br \/>aa64fa4ba75c8c30b7eb57a24cbdf5b1dbb08d728717c89018305294237ac717<br \/>6366167f3d6bec7cddce5a52a94441c1a4097e4c7ab4e7c9e5718c87660dc5e8<br \/>4e14ffc2ec79cb256605f7c2682d56fceec9638cd3545175088ad15977403dcc<br \/>ac5b6f62a62f4453c4b5c577b321fdca73d0e651c209aeb5b88a0c4a7f10b139<br \/>c139e980d2f5f21020b85db716c8a0d363ae3c30f54a7d5c290b320309283b59<br \/>27ab9adb71d7b49f8dcc1e2c168af06e4f71e4c43e7245663fcee191a70f7a7e<br \/>eb3adb1e1ae14300110439e490a39ed54ca51ba820944bd27f481b57eb0ab1aa<br \/>684fe4d87aa412c46b96dfa2c650bda2a0e9ef07bcaf294683387661107a5c72<br \/>6366167f3d6bec7cddce5a52a94441c1a4097e4c7ab4e7c9e5718c87660dc5e8<br \/>2c00997d6b0e9ae06d9ed2fcae6effe9348dc660b3fea1a4e5c011f1eb2b9ace<br \/>66312a50ce08e29c01e9dfeae631f839c95f2c04d8f206e12c04abdd0a5df645<br \/>af02b45c1d1198271da309b5eedde13c4e8a24934407f7a49f10707dfdd796b7<br \/>74ac75cd8f1e35da0d047ed6dd995262563b614b8dfcdfa44f689ca920b51a63<br \/>aa7372fbe02932d1182572e7cc6ba69243be3222eb212418d0b6ea638dea5fbc<br \/>341e88b473dae607b698737b6032c5a0ba3ed1a0ba08bba15757c68126a00e29<br \/>645032eaa3dd159ef027b916950c3e1ab475bedcaaac0f9c61b594d74d6833be<br \/>d74f5d6f91fbc37583e69cbc919fbe41caa84bc77713dc644bcda5b5b8581553<br \/>d8ed7abe7bdb821b93ce24e5ee0e5b867370b3fd6fc5c92f1f2d7d34fa040260<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/\">No man&#8217;s land: How a Magecart group is running a web skimming operation from a war zone<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Thu, 18 Jul 2019 15:00:13 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/' title='No man's land: How a Magecart group is running a web skimming operation from a war zone'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/shutterstock_1015182034.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We take a look into a Magecart group&#8217;s web skimming activities, which are relying on a bulletproof-friendly host in battle-scarred Luhansk, Ukraine to provide cover for their activities, safe from the reach of law enforcement and the security community.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bulletproof\/\" rel=\"tag\">bulletproof<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exfiltration\/\" rel=\"tag\">exfiltration<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gate\/\" rel=\"tag\">gate<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hosting\/\" rel=\"tag\">hosting<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/idn\/\" rel=\"tag\">IDN<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/luhansk\/\" rel=\"tag\">luhansk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magento\/\" rel=\"tag\">magento<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmers\/\" rel=\"tag\">skimmers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sniffers\/\" rel=\"tag\">sniffers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/swipers\/\" rel=\"tag\">swipers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ukraine\/\" rel=\"tag\">ukraine<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/' title='No man's land: How a Magecart group is running a web skimming operation from a war zone'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/\">No man&#8217;s land: How a Magecart group is running a web skimming operation from a war zone<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22325,4503,20214,13488,14855,17740,22326,19622,12370,22327,22328,22329,8642],"class_list":["post-15827","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bulletproof","tag-cybercrime","tag-exfiltration","tag-gate","tag-hosting","tag-idn","tag-luhansk","tag-magecart","tag-magento","tag-skimmers","tag-sniffers","tag-swipers","tag-ukraine"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15827"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15827\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15827"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}