{"id":19393,"date":"2022-06-20T14:10:09","date_gmt":"2022-06-20T22:10:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/20\/news-13126\/"},"modified":"2022-06-20T14:10:09","modified_gmt":"2022-06-20T22:10:09","slug":"news-13126","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/20\/news-13126\/","title":{"rendered":"Client-side Magecart attacks still around, but more covert"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Mon, 20 Jun 2022 21:21:04 +0000<\/strong><\/p>\n<p><em>This blog post was authored by J\u00e9r\u00f4me Segura<\/em><\/p>\n<p>We have seen and heard less buzz about &#8216;Magecart&#8217; during the past several months. While some companies continue to rehash the same breaches of yesteryear, we have been wondering if some changes took place in the threat landscape.<\/p>\n<p>One thing we know is that if the Magecart threat actors decided to switch their operations exclusively server-side then the majority of companies, including ours, would lose visibility overnight. This is why we often look up to researchers that work the website cleanups. If something happens, these guys would likely notice it.<\/p>\n<p>We followed the trail on two recent reports that proved to be worthwhile. It allowed us to make a connection to a previous campaign and identify new pieces of a pretty wide infrastructure.<\/p>\n<p>For now we can say that Magecart client-side attacks are still around and that we could easily be missing them if we rely on automated crawlers and sandboxes, at least if we don&#8217;t make them more robust.<\/p>\n<h2>Newly reported domains linked with &#8216;anti-VM&#8217; skimmer<\/h2>\n<p>On June 12, @rootprivilege&nbsp;<a href=\"https:\/\/twitter.com\/rootprivilege\/status\/1536197955728048128\">tweeted<\/a>&nbsp;about a hacked stored injected with the host js.staticounter[.]net that looked highly suspicious. When originally captured, the JavaScript appeared to be clean but it was confirmed to be malicious by @AffableKraut who&nbsp;<a href=\"https:\/\/twitter.com\/AffableKraut\/status\/1536212823042363392\">posted<\/a>&nbsp;a screenshot of the&nbsp;<a href=\"https:\/\/gist.github.com\/krautface\/469fa925b494b7b436e1fd9346d36b60\">skimmer code<\/a>.<\/p>\n<p>A few days before @rootprivilege posted about this skimmer, @Sansec&nbsp;<a href=\"https:\/\/twitter.com\/sansecio\/status\/1534862125470035970?s=20&amp;t=lA0GiOZeg63rl2MnckgdHQ\" target=\"_blank\" rel=\"noreferrer noopener\">tweeted<\/a>&nbsp;about another new skimmer domain at scanalytic[.]org. Comparing the two which are both on the same ASN (AS29182), we concluded that they are related.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/compare.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"57658\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/attachment\/compare-9\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/compare.png\" data-orig-size=\"714,725\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"compare\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/compare-295x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/compare-591x600.png\" width=\"714\" height=\"725\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/compare.png\" alt=\"\" class=\"wp-image-57658\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/compare.png 714w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/compare-295x300.png 295w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/compare-591x600.png 591w\" sizes=\"auto, (max-width: 714px) 100vw, 714px\" \/><\/a><\/figure>\n<\/div>\n<p>We were able to connect these 2 domains with a previous campaign from November 2021 which was the first instance to our knowledge of a&nbsp;<a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2021\/11\/credit-card-skimmer-evades-virtual-machines\/\">skimmer checking for the use of virtual machines<\/a>. However, both of them are now devoid&nbsp;of VM detection code. It&#8217;s unclear why the threat actors removed it, unless perhaps it caused more issues than benefits.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/antivm.png\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57659\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/attachment\/antivm-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/antivm.png\" data-orig-size=\"1204,903\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"antivm\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/antivm-300x225.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/antivm-600x450.png\" loading=\"lazy\" width=\"1204\" height=\"903\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/antivm.png\" alt=\"\" class=\"wp-image-57659\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/antivm.png 1204w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/antivm-300x225.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/antivm-600x450.png 600w\" sizes=\"auto, (max-width: 1204px) 100vw, 1204px\" \/><\/a><\/figure>\n<\/div>\n<p>There are other differences with the newest skimmer sample from @rootsecdev such as different naming schemes for important input fields. As you can see, in the former case these are explicitly referenced (i.e. CcNumber) while in the later iteration the names are generic web terms, making them less obvious.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5.png\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57557\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/attachment\/image-5-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5.png\" data-orig-size=\"726,724\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image-5\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5-300x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5-600x598.png\" loading=\"lazy\" width=\"726\" height=\"724\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5.png\" alt=\"\" class=\"wp-image-57557\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5.png 726w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5-300x300.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5-600x598.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-5-150x150.png 150w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/a><\/figure>\n<\/div>\n<h2>Additional infrastructure<\/h2>\n<p>Using the urlscan.io service, we were able to discover additional infrastructure related to this ongoing campaign. We started our search with any recent submissions that made contact with an IP address belonging to AS29182.<\/p>\n<p>The table below shows hostnames, their IP address and the date they were first seen on urlscan.io. Most of those were previously unknown to us until we recently started this investigation. You can click on the hyperlinks to load the corresponding sandbox pages, but note that a majority of them do not contain the actual skimmer code. This is most likely because the malicious infrastructure detected that urlscan.io&#8217;s sandbox was not using genuine residential IP addresses.<\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td><strong>Hostname<\/strong><\/td>\n<td><strong>IP address<\/strong><\/td>\n<td><strong>First seen<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Aapp.nomalert.org\" target=\"_blank\" rel=\"noreferrer noopener\">app[.]nomalert[.]org<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.32.64\" target=\"_blank\" rel=\"noreferrer noopener\">185.253.32.64<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/bbef450a-08f1-468c-b5c6-0aeeedb78b68\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">Nov 30, 2021<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Acdn.base-code.org\" target=\"_blank\" rel=\"noreferrer noopener\">cdn[.]base-code[.]org<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.32.59\" target=\"_blank\" rel=\"noreferrer noopener\">185.253.32.59<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/f94c7486-7193-4929-9864-6e94e0e8f31c\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">Jan 30, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Aweb.dwin-co.jp\" target=\"_blank\" rel=\"noreferrer noopener\">web[.]dwin-co[.]jp<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.32.44\">185.253.32.44<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/bd1f28fe-ca78-46da-9ca5-86d07a104fd3\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feb 3, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Adwin1.org\" target=\"_blank\" rel=\"noreferrer noopener\">dwin1[.]org<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.33.40\">185.253.33.40<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/fe7c3c45-05f2-47a7-8c20-8f7779c1f230\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">Feb 22, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Atrustedport.org\" target=\"_blank\" rel=\"noreferrer noopener\">trustedport[.]org<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.32.50\">185.253.32.50<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/ddee3a20-fd99-43bb-bfdf-c21dd1e08914\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">March 4, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Ah.lookmind.net\" target=\"_blank\" rel=\"noreferrer noopener\">h[.]lookmind[.]net<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.32.42\">185.253.32.42<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/b9993b15-a53e-447e-9a9b-097f47de4357\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">March 17, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Aweb.speedstester.com\" target=\"_blank\" rel=\"noreferrer noopener\">web[.]speedstester[.]com<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.33.191\" target=\"_blank\" rel=\"noreferrer noopener\">185.253.33.191<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/123c2fa7-5fed-4e2e-9f09-3bf1a0018868\/\" target=\"_blank\" rel=\"noreferrer noopener\">March 25, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Asearch.global-search.net\" target=\"_blank\" rel=\"noreferrer noopener\">search[.]global-search[.]net<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.33.188\" target=\"_blank\" rel=\"noreferrer noopener\">185.253.33.188<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/cdcb29e8-04f6-4ad8-8361-a2b22e32cea7\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">April 13, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Astatic.clarlity.com\" target=\"_blank\" rel=\"noreferrer noopener\">static[.]clarlity[.]com<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.253.33.179\" target=\"_blank\" rel=\"noreferrer noopener\">185.253.33.179<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/a3881a3e-7ed7-4b3a-863a-53791233be35\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">April 20, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Astatic.newrelc.net\" target=\"_blank\" rel=\"noreferrer noopener\">static[.]newrelc[.]net<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.63.190.207\" target=\"_blank\" rel=\"noreferrer noopener\">185.63.190.207<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/b7a70d34-de36-41f5-a2ad-ffb21447ff5e\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">April 22, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Astatic.druapps.org\" target=\"_blank\" rel=\"noreferrer noopener\">static[.]druapps[.]org<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.63.190.183\">185.63.190.183<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/ec26e200-1403-4066-b02e-3a01e092b463\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">May 26, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Ajs.imagero.org\" target=\"_blank\" rel=\"noreferrer noopener\">js[.]imagero[.]org<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.63.190.144\">185.63.190.144<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/73442ff2-2f07-4258-9c93-fa39df98c5bc\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">May 27, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Acommon.quatserve.com\" target=\"_blank\" rel=\"noreferrer noopener\">common[.]quatserve[.]com<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.63.190.118\">185.63.190.118<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/6fa9086e-d489-4cce-b8cb-58ffbaef2fea\/#summary\" target=\"_blank\" rel=\"noreferrer noopener\">May 30, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Astatic.lookmetric.com\" target=\"_blank\" rel=\"noreferrer noopener\">static[.]lookmetric[.]com<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.63.190.163\">185.63.190.163<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/dc0f43f3-a5ec-465b-8268-7a2a55c79a72\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">June 3, 2022<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/urlscan.io\/search\/#domain%3Acdn.boxsearch.org\" target=\"_blank\" rel=\"noreferrer noopener\">cdn[.]boxsearch[.]org<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/ip\/185.63.190.205\">185.63.190.205<\/a><\/td>\n<td><a href=\"https:\/\/urlscan.io\/result\/abdab705-c8c8-42e3-a3c9-3bc872adf298\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">June 11, 2022<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h2>Validating skimmer activity<\/h2>\n<p>For the domains that are still responding, we can use information collected by urlscan.io and replay the attack using a genuine residential IP address and mimicking a real shopper&#8217;s experience. The image below shows the difference between a crawler session via VPN and one done manually with real network settings.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-4.png\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57556\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/attachment\/image-4-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-4.png\" data-orig-size=\"649,517\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image-4\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-4-300x239.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-4-600x478.png\" loading=\"lazy\" width=\"649\" height=\"517\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-4.png\" alt=\"\" class=\"wp-image-57556\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-4.png 649w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-4-300x239.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-4-600x478.png 600w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/a><\/figure>\n<\/div>\n<p>This allows us to confirm beyond doubt that the domains are indeed malicious, although their ASN should already be enough to proactively block them.<\/p>\n<h2>Connection with previous skimmer activity<\/h2>\n<p>Based on one <a href=\"https:\/\/www.virustotal.com\/gui\/file\/2a0bf40f45c28e0dbf5ca9cdac539780761626cc98a59e2d3caeaac9166474e2\/relations\" target=\"_blank\" rel=\"noreferrer noopener\">hash<\/a>, we can connect these skimmers to past activity going back to at least <a href=\"https:\/\/urlscan.io\/result\/dda1b289-5950-456b-aef3-c2e5a79f68ac\/#transactions\" target=\"_blank\" rel=\"noreferrer noopener\">May 2020<\/a>. One of the hostnames from our previous blog on the anti-vm skimmer, con[.]digital-speed[.]net, was <a href=\"https:\/\/www.virustotal.com\/gui\/url\/5edb1dd5286037ab258f2c13120ee48928ebe385dd0606285f7339d914578fb9\/detection\" target=\"_blank\" rel=\"noreferrer noopener\">loading<\/a> this resource as well. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/hash.png\" data-rel=\"lightbox-image-4\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57660\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/attachment\/hash-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/hash.png\" data-orig-size=\"720,537\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"hash\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/hash-300x224.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/hash-600x448.png\" loading=\"lazy\" width=\"720\" height=\"537\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/hash.png\" alt=\"\" class=\"wp-image-57660\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/hash.png 720w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/hash-300x224.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/hash-600x448.png 600w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/><\/a><\/figure>\n<\/div>\n<p>We can see 3 different themes used by the threat actor to hide their skimmer, named after JavaScript libraries:<\/p>\n<ul>\n<li>hal-data[.]org\/gre\/code.js (<a href=\"https:\/\/urlscan.io\/result\/17da8617-6bd0-4867-a0d1-c480431f1d0c\/\" target=\"_blank\" rel=\"noreferrer noopener\">Angular JS<\/a>)<\/li>\n<li>hal-data[.]org\/data\/ (<a href=\"https:\/\/urlscan.io\/result\/52f90928-24db-41cf-8981-aa281560d97c\/#summary\" target=\"_blank\" rel=\"noreferrer noopener\">Logger<\/a>)<\/li>\n<li>js.g-livestatic[.]com\/theme\/main.js (<a href=\"https:\/\/urlscan.io\/result\/4602099b-66da-4399-8019-529872888056\/\" target=\"_blank\" rel=\"noreferrer noopener\">Modernizr<\/a>)<\/li>\n<\/ul>\n<h2>Less skimmer activity or simply more covert?<\/h2>\n<p>There are likely many more skimmer domains on the infrastructure we detailed above, and it is a good idea to keep a close eye on it. Having said that, we have generally seen less skimming attacks during the past several months. Perhaps we have been too focused on the Magento CMS, or our crawlers and sandboxes are being detected because of various checks including at the network level.<\/p>\n<p>As Ben Martin over at Sucuri showed, WordPress with the WooCommerce plugin is <a href=\"https:\/\/blog.sucuri.net\/2022\/04\/wordpress-overtakes-magento-in-credit-card-skimmers.html\" target=\"_blank\" rel=\"noreferrer noopener\">outpacing Magento<\/a> in terms of attacks. In addition, we (as several other companies) can only observe client-side attacks and as such we are oblivious to what happens server-side. Only a handful of researchers who do website cleanups have the visibility into PHP-based skimmers.<\/p>\n<p>While stealing credit cards is still a good business, there are other types of data considerably more worth it. Crypto wallets and similar digital assets are extremely valuable and there is no doubt that clever schemes to rob those are in place beyond phishing for them. For an example of a client-side attack via JavaScript draining crypto assets, check out this\u00a0<a href=\"https:\/\/blog.confiant.com\/how-one-crypto-drainer-template-facilitates-tens-of-millions-of-dollars-in-theft-66f3794aea4b\">blog<\/a>\u00a0from Eliya Stein over at Confiant.<\/p>\n<p>Malwarebytes customers are protected against this campaign.<\/p>\n<h2>Indicators of Compromise<\/h2>\n<p><strong>Skimmer domains<\/strong><\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<p>abtasty[.]net<br \/>accdn[.]lpsnmedia[.]org<br \/>amplify[.]outbrains[.]net<br \/>apis[.]murdoog[.]org<br \/>app[.]iofrontcloud[.]com<br \/>app[.]nomalert[.]org<br \/>app[.]purechat[.]org<br \/>app[.]rolfinder[.]com<br \/>cdn[.]accutics[.]org<br \/>cdn[.]alexametrics[.]net<br \/>cdn[.]alligaturetrack[.]com<br \/>cdn[.]base-code[.]org<br \/>cdn[.]boxsearch[.]org<br \/>cdn[.]cookieslaw[.]org<br \/>cdn[.]getambassador[.]net<br \/>cdn[.]hs-analytics[.]org<br \/>cdn[.]jsdelivr[.]biz<br \/>cdn[.]nosto[.]org<br \/>cdn[.]pinnaclecart[.]io<br \/>cdn[.]speedcurve[.]org<br \/>cdn[.]tomafood[.]org<br \/>clickcease[.]biz<br \/>common[.]quatserve[.]com<br \/>con[.]digital-speed[.]net<br \/>content[.]digital-metric[.]org<\/p>\n<\/p><\/div>\n<div class=\"wp-block-column\">\n<p>css[.]tevidon[.]com<br \/>demo-metrics[.]net<br \/>dev[.]crisconnect[.]net<br \/>dwin1[.]org<br \/>epos[.]bayforall[.]biz<br \/>feedaty[.]org<br \/>graph[.]cloud-chart[.]net<br \/>h[.]lookmind[.]net<br \/>hal-data[.]org<br \/>img[.]etakeawaymax[.]biz<br \/>js[.]artesfut[.]com<br \/>js[.]g-livestatic[.]com<br \/>js[.]imagero[.]org<br \/>js[.]librarysetr[.]com<br \/>libsconnect[.]net<br \/>listrakbi[.]io<br \/>lp[.]celebrosnlp[.]org<br \/>m[.]brands-watch[.]com<br \/>m[.]sleeknote[.]org<br \/>marklibs[.]com<br \/>nypi[.]dc-storm[.]org<br \/>opendwin[.]com<br \/>pepperjams[.]org<br \/>px[.]owneriq[.]org<\/p>\n<\/p><\/div>\n<div class=\"wp-block-column\">\n<p>r[.]klarnacdn[.]org<br \/>rawgit[.]net<br \/>rolfinder[.]com<br \/>s1[.]listrakbi[.]org<br \/>sdk[.]moonflare[.]org<br \/>search[.]global-search[.]net<br \/>shopvisible[.]org<br \/>sjsmartcontent[.]org<br \/>snapengage[.]io<br \/>st[.]adsrvr[.]biz<br \/>stage[.]sleefnote[.]com<br \/>stat-analytics[.]org<br \/>static[.]clarlity[.]com<br \/>static[.]druapps[.]org<br \/>static[.]lookmetric[.]com<br \/>static[.]mantisadnetwork[.]org<br \/>static[.]newrelc[.]net<br \/>static[.]opendwin[.]com<br \/>t[.]trackedlink[.]org<br \/>troadster[.]com<br \/>trustedport[.]org<br \/>web[.]dwin-co[.]jp<br \/>web[.]livechatsinc[.]net<br \/>web[.]speedstester[.]com<br \/>web[.]webflows[.]net<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p><strong>Skimmer IPs<\/strong><\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<p>185.253.32.174<br \/>185.253.32.42<br \/>185.253.32.44<br \/>185.253.32.50<br \/>185.253.32.59<br \/>185.253.32.64<br \/>185.253.33.179<br \/>185.253.33.188<br \/>185.253.33.191<br \/>185.253.33.40<br \/>185.63.188.59<br \/>185.63.188.70<br \/>185.63.188.71<br \/>185.63.188.79<br \/>185.63.188.85<br \/>185.63.190.118<\/p>\n<\/p><\/div>\n<div class=\"wp-block-column\">\n<p>185.63.190.144<br \/>185.63.190.163<br \/>185.63.190.183<br \/>185.63.190.205<br \/>185.63.190.207<br \/>185.63.190.212<br \/>194.87.217.195<br \/>194.87.217.197<br \/>194.87.217.91<br \/>212.109.222.225<br \/>77.246.157.133<br \/>80.78.249.78<br \/>82.146.50.89<br \/>82.146.50.132<br \/>82.202.160.10<br \/>82.202.160.119<\/p>\n<\/p><\/div>\n<div class=\"wp-block-column\">\n<p>82.202.160.123<br \/>82.202.160.137<br \/>82.202.160.29<br \/>82.202.160.54<br \/>82.202.160.8<br \/>82.202.160.9<br \/>82.202.161.77<br \/>89.108.109.14<br \/>89.108.109.167<br \/>89.108.109.169<br \/>89.108.116.123<br \/>89.108.116.48<br \/>89.108.123.168<br \/>89.108.123.169<br \/>89.108.123.28<br \/>89.108.126.50<br \/>89.108.127.16<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/\">Client-side Magecart attacks still around, but more covert<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Mon, 20 Jun 2022 21:21:04 +0000<\/strong><\/p>\n<p>While we have heard less about web skimming attacks, attacks are still going on, but more quietly than before.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/\">Client-side Magecart attacks still around, but more covert<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26632,12673,26633,19622,12040],"class_list":["post-19393","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-anti-vm","tag-geolocation","tag-ip","tag-magecart","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19393"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19393\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19393"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}