{"id":15964,"date":"2019-08-01T08:10:14","date_gmt":"2019-08-01T16:10:14","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/08\/01\/news-9708\/"},"modified":"2019-08-01T08:10:14","modified_gmt":"2019-08-01T16:10:14","slug":"news-9708","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/01\/news-9708\/","title":{"rendered":"No summer break for Magecart as web skimming intensifies"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 01 Aug 2019 15:00:00 +0000<\/strong><\/p>\n<p>This summer, you are more likely to find the cybercriminal groups Magecart <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Client-side\" target=\"_blank\">client-side<\/a> rather than poolside. <\/p>\n<p>Web skimming, which consists of stealing payment information directly from within the browser, is one of today&#8217;s top web threats. Magecart, the group behind many of these attacks, gained worldwide attention with the British Airways and TicketMaster breaches, costing the former <a rel=\"noreferrer noopener\" aria-label=\"\u00a3183 million ($229 million) in GDPR fine (opens in a new tab)\" href=\"https:\/\/www.bbc.com\/news\/business-48905907\" target=\"_blank\">\u00a3183 million ($229 million) in GDPR fines<\/a>.<\/p>\n<p>Skimmers, sniffers, or swipers (all valid terms used interchangeably over the years) have been around for a long time and fought against mostly on the server side by security companies like <a rel=\"noreferrer noopener\" aria-label=\"Sucuri (opens in a new tab)\" href=\"https:\/\/sucuri.net\/\" target=\"_blank\">Sucuri<\/a> that perform website remediation.<\/p>\n<p>Today, web skimming is a booming business comprised of numerous different threat groups, ranging from mere copycats to more advanced actors. During the past few months, we have witnessed a steady increase in the number of hacked e-commerce sites and skimming scripts. In this post, we share some statistics on web skimming based on our telemetry, as well as what Malwarebytes is doing to protect online shoppers from this threat.<\/p>\n<h3>65K theft attempts blocked in July<\/h3>\n<p>During the past few months, we have been observing a growing number of blocks related to skimmer domains and exfiltration gates. This activity drastically increased as the summer rolled out, most notably with peaks around July 4 (Figure 1).<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/stats.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39761\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/attachment\/stats-8\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/stats.png\" data-orig-size=\"887,251\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"stats\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/stats-300x85.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/stats-600x170.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/stats.png\" alt=\"\" class=\"wp-image-39761\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/stats.png 887w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/stats-300x85.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/stats-600x170.png 600w\" sizes=\"(max-width: 887px) 100vw, 887px\" \/><\/a><figcaption>Figure 1: Web blocks for skimmer domains and gates recorded in our telemetry<\/figcaption><\/figure>\n<p>In the month of July alone, Malwarebytes blocked over 65,000 attempts to steal credit card numbers via compromised online stores. Fifty-four percent of those shoppers were from the United States, followed by Canada, with 16 percent and Germany with 7 percent, as seen in Figure 2.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/pie.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39762\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/attachment\/pie-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/pie.png\" data-orig-size=\"691,352\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"pie\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/pie-300x153.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/pie-600x306.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/pie.png\" alt=\"\" class=\"wp-image-39762\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/pie.png 691w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/pie-300x153.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/pie-600x306.png 600w\" sizes=\"(max-width: 691px) 100vw, 691px\" \/><\/a><figcaption>Figure 2: Top 10 countries for Magecart activity in July<\/figcaption><\/figure>\n<p>In addition to a greater number of compromised e-commerce sites (which often times have been injected with more than one skimmer), we also documented large and ongoing <a rel=\"noreferrer noopener\" aria-label=\"spray and pray attacks on Amazon S3 buckets (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/magecart-skimmers-found-on-amazon-cloudfront-cdn\/\" target=\"_blank\">spray and pray attacks on Amazon S3 buckets<\/a>.<\/p>\n<h3>Many skimmers, too many groups<\/h3>\n<p>Skimmer code can help to identify the groups behind them, but it is becoming increasingly difficult to do so. For instance, the Inter kit that is sold underground is used by different threat actors, and there are many copycats reusing existing code for their own purpose as well.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/scripts.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39763\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/attachment\/scripts-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/scripts.png\" data-orig-size=\"1481,801\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"scripts\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/scripts-300x162.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/scripts-600x325.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/scripts.png\" alt=\"\" class=\"wp-image-39763\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/scripts.png 1481w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/scripts-300x162.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/scripts-600x325.png 600w\" sizes=\"(max-width: 1481px) 100vw, 1481px\" \/><\/a><figcaption>Figure 3: Fragments from different skimmer scripts <\/figcaption><\/figure>\n<p>Having said that, skimmers typically have a similar set of functionalities:<\/p>\n<ul>\n<li>Looking at the current page to see if it&#8217;s the checkout<\/li>\n<li>Making sure developer tools are not in use<\/li>\n<li>Identifying form fields by their ID<\/li>\n<li>Doing some validation of the data<\/li>\n<li>Encoding the data (Base64 or AES)<\/li>\n<li>Exfiltrating the data to their external gate or on the compromised store<\/li>\n<\/ul>\n<p>While some skimmers are simple and easily readable JavaScript code, more and more are using some form of obfuscation. This is an effort to thwart detection attempts, and it also serves to hide certain pieces of information, such as the gates (criminal-controlled servers) that are used to collect the stolen data. Fellow researchers also <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/AffableKraut\/status\/1148460955166302208?s=20\" target=\"_blank\">noted<\/a> the same for the data exfiltration process, although strange encryption may actually raise suspicions. <\/p>\n<h3>Magecart protection, client-side<\/h3>\n<p>Combating skimmers ought to start server-side with administrators remediating the threat and implementing a proper patching, hardening, and mitigation regimen. However, based on our experience, a great majority of site owners are either oblivious or fail to prevent re-infections.<\/p>\n<p>A more effective approach consists of filing abuse reports with CERTs and working with partners to take a more global approach by tackling the criminal infrastructure. But even that is no guarantee, especially when threat actors rely on bulletproof services.<\/p>\n<p>We often get asked how consumers can protect themselves from Magecart threats. Generally speaking, it&#8217;s better to stick to large online shopping portals rather than smaller ones. But, this piece of advice hasn&#8217;t always held true in the past. <\/p>\n<p>At Malwarebytes, we identify those skimmer domains and exfiltration gates. This means that by blocking one malicious hostname or IP address, we can protect shoppers from dozens, if not hundreds, of malicious or compromised online stores at once.<\/p>\n<p>In Figure 4, we see how Malwarebytes intercepts a skimmer that had been injected into the website for <a rel=\"noreferrer noopener\" aria-label=\"Pelican Products (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Pelican_Products\" target=\"_blank\">Pelican Products<\/a> before the customer entered their information. (We reported this breach to Pelican and it appears that the site is now clean). <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/skimmer_block.gif\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39704\" data-permalink=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/attachment\/skimmer_block\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/skimmer_block.gif\" data-orig-size=\"840,721\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"skimmer_block\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/skimmer_block-300x258.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/skimmer_block-600x515.gif\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/skimmer_block.gif\" alt=\"\" class=\"wp-image-39704\" \/><\/a><figcaption>Figure 4: Magecart theft attempt blocked in realtime<\/figcaption><\/figure>\n<\/div>\n<p>The recent headlines about data breaches have eroded people&#8217;s trust in entering personal information online. And yet, there are still many myths that persist and give a false sense of security. For example, the trust seals many merchants proudly display or even their use of digital certificates (HTTPS) will not protect you from a Magecart attack.<\/p>\n<p>There is no doubt that Magecart threat actors, despite their diversity, are in it for the long game and because the attack surface is quite vast, we are bound to observe new schemes in the near future.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/\">No summer break for Magecart as web skimming intensifies<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 01 Aug 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/' title='No summer break for Magecart as web skimming intensifies'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/shutterstock_579993079.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Despite the heat, criminals are hard at work stealing credit card data from unaware shoppers. July marks a notable increase in web skimmer attacks over previous months.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/web-threats\/\" rel=\"category tag\">Web threats<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/code-injection\/\" rel=\"tag\">code injection<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gate\/\" rel=\"tag\">gate<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magento\/\" rel=\"tag\">magento<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-domains\/\" rel=\"tag\">malicious domains<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-ips\/\" rel=\"tag\">malicious IPs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-websites\/\" rel=\"tag\">malicious websites<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmer\/\" rel=\"tag\">skimmer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmers\/\" rel=\"tag\">skimmers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sniffer\/\" rel=\"tag\">sniffer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimmers\/\" rel=\"tag\">web skimmers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-threat\/\" rel=\"tag\">web threat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-threats\/\" rel=\"tag\">web threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wiper\/\" rel=\"tag\">wiper<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/' title='No summer break for Magecart as web skimming intensifies'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/no-summer-break-for-magecart-as-web-skimming-intensifies\/\">No summer break for Magecart as web skimming intensifies<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[17769,13488,19622,12370,22521,22522,22518,19623,22327,22523,19624,22524,11716,16068],"class_list":["post-15964","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-code-injection","tag-gate","tag-magecart","tag-magento","tag-malicious-domains","tag-malicious-ips","tag-malicious-websites","tag-skimmer","tag-skimmers","tag-sniffer","tag-web-skimmers","tag-web-threat","tag-web-threats","tag-wiper"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15964"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15964\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15964"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}