{"id":18267,"date":"2022-02-12T10:45:02","date_gmt":"2022-02-12T18:45:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/12\/news-12000\/"},"modified":"2022-02-12T10:45:02","modified_gmt":"2022-02-12T18:45:02","slug":"news-12000","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/12\/news-12000\/","title":{"rendered":"Hackers Rigged Hundreds of Ecommerce Sites to Steal Payment Info"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6207094d94a57925893abbff\/master\/pass\/Security-Credit-Card-Theft-1209373123.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Sat, 12 Feb 2022 13:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/dan-goodin-ars-technica\">Dan Goodin, Ars Technica<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">About 500 ecommerce<\/span> websites were recently found to be compromised by hackers who installed a credit card skimmer that surreptitiously stole sensitive data when visitors attempted to make a purchase.<\/p>\n<p class=\"paywall\">This story originally appeared on <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/hundreds-of-e-commerce-sites-booby-trapped-with-payment-card-skimming-malware\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/hundreds-of-e-commerce-sites-booby-trapped-with-payment-card-skimming-malware\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/hundreds-of-e-commerce-sites-booby-trapped-with-payment-card-skimming-malware\/\" rel=\"nofollow noopener\" target=\"_blank\">Ars Technica<\/a>, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED&#x27;s parent company, Cond\u00e9 Nast.<\/p>\n<p class=\"paywall\">A <a data-offer-url=\"https:\/\/sansec.io\/research\/naturalfreshmall-mass-hack\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/sansec.io\/research\/naturalfreshmall-mass-hack&quot;}\" href=\"https:\/\/sansec.io\/research\/naturalfreshmall-mass-hack\" rel=\"nofollow noopener\" target=\"_blank\">report<\/a> published on Tuesday is only the latest one involving Magecart, an umbrella term given to competing crime groups that infect <a href=\"https:\/\/www.wired.com\/tag\/e-commerce\/\">ecommerce<\/a> sites with skimmers. Over the past few years, <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2019\/03\/a-new-rash-of-highly-covert-card-skimming-malware-infects-ecommerce-sites\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2019\/03\/a-new-rash-of-highly-covert-card-skimming-malware-infects-ecommerce-sites\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/03\/a-new-rash-of-highly-covert-card-skimming-malware-infects-ecommerce-sites\/\" rel=\"nofollow noopener\" target=\"_blank\">thousands<\/a> of <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2018\/11\/sign-of-the-times-payment-card-skimmers-go-head-to-head-on-e-commerce-site\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2018\/11\/sign-of-the-times-payment-card-skimmers-go-head-to-head-on-e-commerce-site\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2018\/11\/sign-of-the-times-payment-card-skimmers-go-head-to-head-on-e-commerce-site\/\" rel=\"nofollow noopener\" target=\"_blank\">sites<\/a> have been <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2018\/09\/newegg-hit-by-credit-card-stealing-code-injected-into-shopping-code\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2018\/09\/newegg-hit-by-credit-card-stealing-code-injected-into-shopping-code\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2018\/09\/newegg-hit-by-credit-card-stealing-code-injected-into-shopping-code\/\" rel=\"nofollow noopener\" target=\"_blank\">hit<\/a> by exploits that cause them to run <a href=\"https:\/\/www.wired.com\/tag\/malware\/\">malicious code<\/a>. When visitors enter payment card details during purchase, the code sends that information to attacker-controlled servers.<\/p>\n<p class=\"paywall\">Sansec, the security firm that discovered the latest batch of infections, said the compromised sites were all loading malicious scripts hosted at the domain naturalfreshmall[.]com.<\/p>\n<p class=\"paywall\">\u201cThe Natural Fresh skimmer shows a fake payment popup, defeating the security of a (PCI compliant) hosted payment form,\u201d firm researchers <a data-offer-url=\"https:\/\/twitter.com\/sansecio\/status\/1486258634409623552\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/sansecio\/status\/1486258634409623552&quot;}\" href=\"https:\/\/twitter.com\/sansecio\/status\/1486258634409623552\" rel=\"nofollow noopener\" target=\"_blank\">wrote<\/a> on Twitter. \u201cPayments are sent to https:\/\/naturalfreshmall[.]com\/payment\/Payment.php.\u201d<\/p>\n<p class=\"paywall\">The <a href=\"https:\/\/www.wired.com\/tag\/hacking\/\">hackers<\/a> then modified existing files or planted new files that provided no fewer than 19 backdoors that the hackers could use to retain control over the sites in the event the malicious script was detected and removed and the vulnerable software was updated. The only way to fully disinfect the site is to identify and remove the backdoors before updating the vulnerable CMS that allowed the site to be hacked in the first place.<\/p>\n<p class=\"paywall\">Sansec worked with the admins of hacked sites to determine the common entry point used by the attackers. The researchers eventually determined that the attackers combined a SQL injection exploit with a PHP object injection attack in a Magento plug-in known as Quickview. The exploits allowed the attackers to execute malicious code directly on the web server.<\/p>\n<p class=\"paywall\">They accomplished this code execution by abusing Quickview to add a validation rule to the customer_eav_attribute table and injecting a payload that tricked the host application into crafting a malicious object. Then, they signed up as a new user on the site.<\/p>\n<p class=\"paywall\">\u201cHowever, just adding it to the database will not run the code,\u201d Sansec researchers <a data-offer-url=\"https:\/\/sansec.io\/research\/naturalfreshmall-mass-hack\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/sansec.io\/research\/naturalfreshmall-mass-hack&quot;}\" href=\"https:\/\/sansec.io\/research\/naturalfreshmall-mass-hack\" rel=\"nofollow noopener\" target=\"_blank\">explained<\/a>. \u201cMagento actually needs to unserialize the data. And there is the cleverness of this attack: By using the validation rules for new customers, the attacker can trigger an unserialize by simply browsing the Magento signup page.\u201d<\/p>\n<p class=\"paywall\">It\u2019s not hard to find sites that remain infected more than a week after Sansec first reported the campaign on Twitter. At the time this post was going live, Bedexpress[.]com continued to contain this HTML attribute, which pulls JavaScript from the rogue naturalfreshmall[.]com domain.<\/p>\n<p class=\"paywall\">The hacked sites were running Magento 1, a version of the ecommerce platform that was retired in June 2020. The safer bet for any site still using this deprecated package is to upgrade to the latest version of Adobe Commerce. Another option is to install open source patches available for Magento 1 using either DIY software from the OpenMage project or with commercial support from Mage-One.<\/p>\n<p class=\"paywall\">It\u2019s generally hard for people to detect payment-card skimmers without special training. One option is to use antivirus software such as Malwarebytes, which examines in real time the JavaScript being served on a visited website. People also may want to steer clear of sites that appear to be using outdated software, although that\u2019s hardly a guarantee that the site is safe.<\/p>\n<p class=\"paywall\"><em>This story originally appeared on<\/em> <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/hundreds-of-e-commerce-sites-booby-trapped-with-payment-card-skimming-malware\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/hundreds-of-e-commerce-sites-booby-trapped-with-payment-card-skimming-malware\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/hundreds-of-e-commerce-sites-booby-trapped-with-payment-card-skimming-malware\/\" rel=\"nofollow noopener\" target=\"_blank\"><em>Ars Technica<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/hackers-stole-payment-info-from-websites\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6207094d94a57925893abbff\/master\/pass\/Security-Credit-Card-Theft-1209373123.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Sat, 12 Feb 2022 13:00:00 +0000<\/strong><\/p>\n<p>The attackers exploited a known vulnerability and installed credit card skimmers on more than 500 websites.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-18267","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18267"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18267\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18267"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}