{"id":17829,"date":"2020-02-26T10:10:02","date_gmt":"2020-02-26T18:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/26\/news-11562\/"},"modified":"2020-02-26T10:10:02","modified_gmt":"2020-02-26T18:10:02","slug":"news-11562","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/26\/news-11562\/","title":{"rendered":"Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 26 Feb 2020 17:03:11 +0000<\/strong><\/p>\n<p>Threat actors love to abuse legitimate brands and infrastructure\u2014this, we know. Last year we <a rel=\"noreferrer noopener\" aria-label=\"exposed (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/magecart-skimmers-found-on-amazon-cloudfront-cdn\/\" target=\"_blank\">exposed<\/a> how web skimmers had found their way onto Amazon&#8217;s Cloudfront content delivery network (CDN) via insecure S3 buckets. Now, we discovered scammers pretending to be CDNs while exfiltrating data and hiding their tracks\u2014another reason to keep watchful eye on third-party content.<\/p>\n<p>Sometimes, what looks like a CDN may turn out to be anything but. Using lookalike domains is nothing new among malware authors. One trend we see a fair bit with web skimmers in particular is domains that mimic Google Analytics: Practically all websites use this service for their ranking and statistics, so it makes for credible copycats.<\/p>\n<p>In the latest case, we caught scammers using two different domains pretending to be a CDN. While typically the second piece of the infrastructure is used for data exfiltration, it only acts as an intermediary that attempts to hide the actual exfiltration server.<\/p>\n<p>Oddly, the crooks decided to use a local web server exposed to the Internet via the free ngrok service\u2014a reverse proxy software that creates secure tunnels\u2014to collect the stolen data. This combination of tricks and technologies shows us that fraudsters can devise custom schemes in an attempt to evade detection.<\/p>\n<h3>Inspecting code for unauthorized third-parties<\/h3>\n<p>We identified suspicious code on the website for a popular Parisian boutique store. However, to the naked eye, the script in question looks just like another jQuery library loaded from a third-party CDN.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42490\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/attachment\/site_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/site_.png\" data-orig-size=\"906,800\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"site_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/site_-300x265.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/site_-600x530.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/site_.png\" alt=\"\" class=\"wp-image-42490\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/site_.png 906w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/site_-300x265.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/site_-600x530.png 600w\" sizes=\"(max-width: 906px) 100vw, 906px\" \/><figcaption><em>Figure 1: Compromised online store, with source code showing a CDN like domain<\/em><\/figcaption><\/figure>\n<p>Although the domain name (cdn-sources[.]org) alludes to a CDN, and unveil.js is a <a rel=\"noreferrer noopener\" aria-label=\"legitimate library (opens in a new tab)\" href=\"https:\/\/github.com\/luis-almeida\/unveil\" target=\"_blank\">legitimate library<\/a>, a quick look at the content shows some inconsistencies. There should not be fields looking for a credit card number for this kind of plugin.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42491\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/attachment\/souce_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/souce_.png\" data-orig-size=\"908,669\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"souce_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/souce_-300x221.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/souce_-600x442.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/souce_.png\" alt=\"\" class=\"wp-image-42491\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/souce_.png 908w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/souce_-300x221.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/souce_-600x442.png 600w\" sizes=\"(max-width: 908px) 100vw, 908px\" \/><figcaption><em>Figure 2: A malicious third-party library impersonating a legitimate one<\/em><\/figcaption><\/figure>\n<p>To clear any doubts, we decided to check an archived copy of the site and compared it with a live snapshot. We can indeed see that this script did not exist just a couple of weeks prior. Either it was added by the site owner, or in this case, injected by attackers.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42482\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/attachment\/injection-8\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/injection.png\" data-orig-size=\"722,533\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"injection\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/injection-300x221.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/injection-600x443.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/injection.png\" alt=\"\" class=\"wp-image-42482\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/injection.png 722w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/injection-300x221.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/injection-600x443.png 600w\" sizes=\"(max-width: 722px) 100vw, 722px\" \/><figcaption><em>Figure 3: Snapshots comparing online store before and after the hack<\/em><\/figcaption><\/figure>\n<p>The script checks for the current URL in the address bar and if it matches with that of a checkout page, it begins collecting form data. This typically includes the shopper&#8217;s name, address, email, phone number, and credit card information.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42485\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/attachment\/stepinto\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/stepinto.png\" data-orig-size=\"761,312\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"stepinto\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/stepinto-300x123.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/stepinto-600x246.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/stepinto.png\" alt=\"\" class=\"wp-image-42485\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/stepinto.png 761w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/stepinto-300x123.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/stepinto-600x246.png 600w\" sizes=\"(max-width: 761px) 100vw, 761px\" \/><figcaption><em>Figure 4: Another fake CDN domain used as part of the data exfiltration process<\/em><\/figcaption><\/figure>\n<h3>Data exfiltration via ngrok server<\/h3>\n<p>Once this data is collected, the skimmer will exfiltrate it to a remote location. Here, we see yet another CDN lookalike in cdn-mediafiles[.]org. However, after checking the network traffic, we noticed this is not the actual exfiltration domain, but simply an intermediary.<\/p>\n<pre class=\"wp-block-preformatted\">GET https:\/\/cdn-mediafiles.org\/cache.php HTTP\/1.1 Host: <strong>cdn-mediafiles.org<\/strong> Connection: keep-alive Accept: <em>\/<\/em> Sec-Fetch-Site: cross-site Sec-Fetch-Mode: cors Referer: https:\/\/www.{removed}.com\/checkout\/onepage\/ Accept-Encoding: gzip, deflate, br Accept-Language: en-US,en;q=0.9  HTTP\/1.1 200 OK Content-Type: text\/html; charset=UTF-8 Connection: keep-alive Content-Length: 36 <strong>Ly9kNjgzNDRmYi5uZ3Jvay5pby9hZC5waHA=<\/strong><\/pre>\n<p>Instead, the GET request returns a Base64 encoded response. This string, which was already present in the original skimmer script, decodes to \/\/d68344fb.ngrok[.]io\/ad.php which turns out to be the actual exfiltration server.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42486\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/attachment\/exfil-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/exfil.png\" data-orig-size=\"772,526\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"exfil\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/exfil-300x204.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/exfil-600x409.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/exfil.png\" alt=\"\" class=\"wp-image-42486\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/exfil.png 772w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/exfil-300x204.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/exfil-600x409.png 600w\" sizes=\"(max-width: 772px) 100vw, 772px\" \/><figcaption><em>Figure 5: Customer data being stolen and exfiltrated to ngrok server<\/em><\/figcaption><\/figure>\n<p><a rel=\"noreferrer noopener\" aria-label=\"ngrok (opens in a new tab)\" href=\"https:\/\/ngrok.com\/\" target=\"_blank\">Ngrok<\/a> is software that can expose a local machine to the outside as if it was an external server. Users can create a free account and get a public URL. Crooks have abused ngrok to exfiltrate credit card data <a rel=\"noreferrer noopener\" aria-label=\"before (opens in a new tab)\" href=\"https:\/\/sansec.io\/labs\/2018\/10\/23\/magecart-extension-0days\/\" target=\"_blank\">before<\/a>.<\/p>\n<p>To summarize, the compromised e-commerce site loads a skimmer from a domain made to look like a CDN. Data is collected when a shopper is about to make a payment and sent to a custom ngrok server after a simple redirect.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42492\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/attachment\/traffic_-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/traffic_.png\" data-orig-size=\"787,210\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/traffic_-300x80.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/traffic_-600x160.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/traffic_.png\" alt=\"\" class=\"wp-image-42492\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/traffic_.png 787w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/traffic_-300x80.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/traffic_-600x160.png 600w\" sizes=\"(max-width: 787px) 100vw, 787px\" \/><figcaption><em>Figure 6: Traffic flow, from skimming to data exfiltration<\/em><\/figcaption><\/figure>\n<p>The above view is simplified, only keeping the key elements responsible for the skimming activity. In practice, network captures will contain hundreds more sequences that will make it more difficult to isolate the actual malicious activity.<\/p>\n<h3>Blocking and reporting<\/h3>\n<p>We caught this campaign early on, and at the time only a handful of sites had been injected with the skimmer. We reported it to the affected parties while also making sure that <a href=\"http:\/\/www.malwarebytes.com\/premium\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Malwarebytes users (opens in a new tab)\">Malwarebytes users<\/a> were protected against it.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42495\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/attachment\/webblock\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/webblock.png\" data-orig-size=\"783,681\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"webblock\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/webblock-300x261.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/webblock-600x522.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/webblock.png\" alt=\"\" class=\"wp-image-42495\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/webblock.png 783w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/webblock-300x261.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/webblock-600x522.png 600w\" sizes=\"(max-width: 783px) 100vw, 783px\" \/><figcaption><em>Figure 7: Malwarebytes blocking the skimmer on the checkout page<\/em><\/figcaption><\/figure>\n<p>Threat actors know they typically have a small window of opportunity before their infrastructure gets detected and possibly shutdown. They can devise clever tricks to mask their activity in addition to using domains that are either fresh or belong to legitimate (but abused) owners.<\/p>\n<p>While these breaches hurt the reputation of online merchants, customers also suffer the consequences of a hack. Not only do they have to go through the hassle of getting new credit cards, their identities are stolen as well, opening the door to future <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"phishing attacks (opens in a new tab)\">phishing attacks<\/a> and impersonation attempts.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p><strong>Web skimmer domain<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">cdn-sources[.]org<\/pre>\n<p><strong>Web skimmer scripts<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">cdn-sources[.]org\/jquery.unveil.js<br \/>cdn-sources[.]org\/adrum-4.4.3.717.js<br \/>cdn-sources[.]org\/jquery.social.share.2.2.min.js<\/pre>\n<p><strong>Redirect<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">cdn-mediafiles[.]org\/cache.php<\/pre>\n<p><strong>Exfiltration URL<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">d68344fb.ngrok[.]io\/ad.php<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/\">Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 26 Feb 2020 17:03:11 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/' title='Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/shutterstock_259594700.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Criminals set up fraudulent infrastructure that looks like a typical content delivery network\u2014except it isn&#8217;t. Behind it hides a credit card skimmer injected into Magento online stores.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cdn\/\" rel=\"tag\">cdn<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/content-delivery-network\/\" rel=\"tag\">content delivery network<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/credit-card-data\/\" rel=\"tag\">credit card data<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-exfiltration\/\" rel=\"tag\">data exfiltration<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magento\/\" rel=\"tag\">magento<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ngrok\/\" rel=\"tag\">ngrok<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/proxy-server\/\" rel=\"tag\">proxy server<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/secure-tunnels\/\" rel=\"tag\">secure tunnels<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmers\/\" rel=\"tag\">skimmers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tunneling\/\" rel=\"tag\">tunneling<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimmer\/\" rel=\"tag\">web skimmer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimmers\/\" rel=\"tag\">web skimmers<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/' title='Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/\">Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[21504,24325,24326,24327,19622,12370,24328,24329,24330,22327,10494,24331,23515,19624],"class_list":["post-17829","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cdn","tag-content-delivery-network","tag-credit-card-data","tag-data-exfiltration","tag-magecart","tag-magento","tag-ngrok","tag-proxy-server","tag-secure-tunnels","tag-skimmers","tag-threat-analysis","tag-tunneling","tag-web-skimmer","tag-web-skimmers"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17829"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17829\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17829"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}