{"id":14695,"date":"2019-02-26T09:10:08","date_gmt":"2019-02-26T17:10:08","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/02\/26\/news-8444\/"},"modified":"2019-02-26T09:10:08","modified_gmt":"2019-02-26T17:10:08","slug":"news-8444","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/02\/26\/news-8444\/","title":{"rendered":"New Golang brute forcer discovered amid rise in e-commerce attacks"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 26 Feb 2019 16:00:08 +0000<\/strong><\/p>\n<p>E-commerce websites continue to be targeted by online criminals looking to steal personal and payment information directly from unaware shoppers. Recently, attacks have been conducted via skimmer, which is\u00a0a piece of code that is either directly injected into a hacked site or referenced externally. Its purpose is to watch for user input, in particular around online shopping carts, and send the perpetrators that data, such as credit card numbers and passwords, in clear text.<\/p>\n<p>Compromising e-commerce sites can be achieved in more than one way. Vulnerabilities in popular Content Management Systems (CMSes) like Magento, as well as in various plugins are commonly exploited these days. But because many website owners still use weak passwords, brute force attacks where multiple logins are attempted are still a viable option.<\/p>\n<p>Our investigation started following the discovery of many Magento websites that were newly infected. We\u00a0pivoted on the domain name used by the skimmer and found a connection to a new piece of malware that turned out to be a brute forcer for Magento, phpMyAdmin, and cPanel. While we can&#8217;t ascertain for sure whether this is how the skimmer was injected, we believe this may be one of many campaigns currently going after e-commerce sites.<\/p>\n<h3>Compromised website<\/h3>\n<p>The malicious code was found injected directly into the site&#8217;s homepage, referencing an external piece of JavaScript. This means that the shopping site had been compromised either via a vulnerability or by brute forcing the administrator password.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/skimmer_inject.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27255\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/skimmer_inject\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/skimmer_inject.png\" data-orig-size=\"867,644\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"skimmer_inject\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/skimmer_inject-300x223.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/skimmer_inject-600x446.png\" class=\"alignnone size-full wp-image-27255\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/skimmer_inject.png\" alt=\"\" width=\"867\" height=\"644\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/skimmer_inject.png 867w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/skimmer_inject-300x223.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/skimmer_inject-600x446.png 600w\" sizes=\"auto, (max-width: 867px) 100vw, 867px\" \/><\/a><\/p>\n<p>The online store is running the Magento CMS and using the <a href=\"https:\/\/www.onestepcheckout.com\/\" target=\"_blank\" rel=\"noopener\">OneStepCheckout<\/a> library to process customers&#8217; shopping carts.\u00a0As the victim enters their address and payment details, their data is\u00a0exfiltrated via a POST request with the information in Base64 format to <em>googletagmanager[.]eu<\/em>. This domain has been flagged before as part of criminal activities related to the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/how-to-protect-your-data-from-magecart-and-other-e-commerce-attacks\/\" target=\"_blank\" rel=\"noopener\">Magecart<\/a> threat groups.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/exfiltration_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27253\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/exfiltration_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/exfiltration_.png\" data-orig-size=\"578,369\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"exfiltration_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/exfiltration_-300x192.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/exfiltration_.png\" class=\"alignnone size-full wp-image-27253\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/exfiltration_.png\" alt=\"\" width=\"578\" height=\"369\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/exfiltration_.png 578w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/exfiltration_-300x192.png 300w\" sizes=\"auto, (max-width: 578px) 100vw, 578px\" \/><\/a><\/p>\n<p>Using <a href=\"https:\/\/www.virustotal.com\/#\/graph-overview\" target=\"_blank\" rel=\"noopener\">VirusTotal Graph<\/a>, we found a connection between this e-commerce site and a piece of malware written in Golang, more specifically a network query from the piece of malware to the compromised website. Expanding on it, we saw that the malware was dropped by yet another binary written in Delphi. Perhaps more interestingly, this opened up another large set of domains with which the malware communicates.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/VirusTotal_Graph.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27257\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/virustotal_graph-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/VirusTotal_Graph.png\" data-orig-size=\"577,702\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"VirusTotal_Graph\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/VirusTotal_Graph-247x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/VirusTotal_Graph-493x600.png\" class=\"alignnone size-full wp-image-27257\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/VirusTotal_Graph.png\" alt=\"\" width=\"577\" height=\"702\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/VirusTotal_Graph.png 577w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/VirusTotal_Graph-247x300.png 247w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/VirusTotal_Graph-493x600.png 493w\" sizes=\"auto, (max-width: 577px) 100vw, 577px\" \/><\/a><\/p>\n<h3>Payload analysis<\/h3>\n<h4>Delphi downloader<\/h4>\n<p>The first part is a downloader we detect as <strong><em>Trojan.WallyShack<\/em><\/strong> that has two layers of packing. The first layer is UPX. After unpacking it with the default UPX, we get the second layer: an underground packer using process hollowing.<\/p>\n<p>The downloader is pretty simple. First, it collects some basic information about the system, and then it beacons to the C2. We can see that the domain names for the panels are hardcoded in the binary:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panels.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27280\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/panels\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panels.png\" data-orig-size=\"559,577\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"panels\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panels-291x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panels.png\" class=\"size-full wp-image-27280 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panels.png\" alt=\"\" width=\"559\" height=\"577\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panels.png 559w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panels-291x300.png 291w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/a><\/p>\n<p>The main goal of this element is to download and run a payload file:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/download_payload-1.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27281\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/download_payload-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/download_payload-1.png\" data-orig-size=\"778,252\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"download_payload\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/download_payload-1-300x97.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/download_payload-1-600x194.png\" class=\"size-full wp-image-27281 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/download_payload-1.png\" alt=\"\" width=\"778\" height=\"252\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/download_payload-1.png 778w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/download_payload-1-300x97.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/download_payload-1-600x194.png 600w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" \/><\/a><\/p>\n<h4>Golang payload<\/h4>\n<p>Here the dropped payload installs itself in the Startup folder, by first dumping a bash script in %TEMP%, which is then deployed under the Startup folder. The sample is not packed, and looking inside, we can find artifacts indicating that it was written in Golang version 1.9. We detect this file as <strong><em>Trojan.StealthWorker.GO<\/em><\/strong>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27282\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/go\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go.png\" data-orig-size=\"605,126\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"go\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go-300x62.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go-600x125.png\" class=\"size-full wp-image-27282 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go.png\" alt=\"\" width=\"605\" height=\"126\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go.png 605w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go-300x62.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go-600x125.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/go-604x126.png 604w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p>The procedure of reversing will be similar to what we have done before with <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/analyzing-new-stealer-written-golang\/\" target=\"_blank\" rel=\"noopener\">another Golang sample<\/a>. Looking at the functions with prefix &#8220;main_&#8221;,\u00a0 we can distinguish the functions that were part of the analyzed binary, rather than part of statically-linked libraries.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/functions-1.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27283\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/functions-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/functions-1.png\" data-orig-size=\"501,495\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"functions\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/functions-1-300x296.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/functions-1.png\" class=\"size-full wp-image-27283 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/functions-1.png\" alt=\"\" width=\"501\" height=\"495\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/functions-1.png 501w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/functions-1-300x296.png 300w\" sizes=\"auto, (max-width: 501px) 100vw, 501px\" \/><\/a><\/p>\n<p>We found several functions with the name &#8220;Brut,&#8221; suggesting this piece of malware is dedicated to brute forcing.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/main_main.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27284\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/main_main-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/main_main.png\" data-orig-size=\"793,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"main_main\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/main_main-300x252.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/main_main-600x505.png\" class=\"size-full wp-image-27284 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/main_main.png\" alt=\"\" width=\"793\" height=\"667\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/main_main.png 793w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/main_main-300x252.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/main_main-600x505.png 600w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><\/a><\/p>\n<p>This is the malware sample that communicated with the aforementioned compromised e-commerce site. In the following section, we will review how communication and tasks are implemented.<\/p>\n<h3>Bot communication and brute forcing<\/h3>\n<p>Upon execution, the Golang binary will connect to 5.45.69[.]149.\u00a0Checking that IP address, we can indeed see a web panel:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panel.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27258\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/panel-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panel.png\" data-orig-size=\"541,421\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"panel\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panel-300x233.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panel.png\" class=\"alignnone size-full wp-image-27258\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panel.png\" alt=\"\" width=\"541\" height=\"421\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panel.png 541w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/panel-300x233.png 300w\" sizes=\"auto, (max-width: 541px) 100vw, 541px\" \/><\/a><\/p>\n<p>The bot proceeds to report the infected computer is ready for a new task via a series of HTTP requests announcing itself and then receiving instructions. You can see below how the bot will attempt to brute force Magento sites leveraging the <a href=\"https:\/\/magento.stackexchange.com\/questions\/16504\/recommended-method-to-protect-downloader\" target=\"_blank\" rel=\"noopener\">\/downloader\/directory<\/a>\u00a0point of entry:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Magento_Bruteforce.png\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27268\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/magento_bruteforce\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Magento_Bruteforce.png\" data-orig-size=\"493,441\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Magento_Bruteforce\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Magento_Bruteforce-300x268.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Magento_Bruteforce.png\" class=\"alignnone size-full wp-image-27268\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Magento_Bruteforce.png\" alt=\"\" width=\"493\" height=\"441\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Magento_Bruteforce.png 493w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Magento_Bruteforce-300x268.png 300w\" sizes=\"auto, (max-width: 493px) 100vw, 493px\" \/><\/a><\/p>\n<p>Brute force attacks can be quite slow given the number of possible password combinations. For this reason, criminals usually leverage CMS or plugin vulnerabilities instead, as they provide a much faster return on investment. Having said that, using a botnet to perform login attempts allows threat actors to distribute the load onto a large number of workers. Given that many people are still using weak passwords for authentication, brute forcing can still be an effective method to compromise websites.<\/p>\n<h3>Attack timeframe and other connections<\/h3>\n<p>We found many different variants of that Golang sample, the majority of them first seen in VirusTotal in early February (hashes available in the IOCs section below).<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/similarto.png\" data-rel=\"lightbox-10\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27275\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/similarto\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/similarto.png\" data-orig-size=\"586,352\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"similarto\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/similarto-300x180.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/similarto.png\" class=\"alignnone size-full wp-image-27275\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/similarto.png\" alt=\"\" width=\"586\" height=\"352\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/similarto.png 586w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/similarto-300x180.png 300w\" sizes=\"auto, (max-width: 586px) 100vw, 586px\" \/><\/a><\/p>\n<p>Checking on some of these other samples, we noticed that there&#8217;s more than just Magento brute forcing. Indeed, some bots are instead going after WordPress sites, for example. Whenever the bot checks back with the server, it will receive a new set of domains and passwords.\u00a0Here&#8217;s an example of brute forcing <a href=\"https:\/\/docs.phpmyadmin.net\/en\/latest\/faq.html#which-parameters-can-i-use-in-the-url-that-starts-phpmyadmin\" target=\"_blank\" rel=\"noopener\">phpMyAdmin<\/a>:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/workers.png\" data-rel=\"lightbox-11\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27259\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/attachment\/workers\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/workers.png\" data-orig-size=\"674,494\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"workers\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/workers-300x220.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/workers-600x440.png\" class=\"alignnone size-full wp-image-27259\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/workers.png\" alt=\"\" width=\"674\" height=\"494\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/workers.png 674w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/workers-300x220.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/workers-600x440.png 600w\" sizes=\"auto, (max-width: 674px) 100vw, 674px\" \/><\/a><\/p>\n<pre>POST:  set_session=&amp;pma_username=Root&amp;pma_password=Administ..&amp;server=1&amp;target=  index.php&amp;token=    User-Agent:  Mozilla\/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko\/20100101 Firefox\/62.0<\/pre>\n<p>As we were investigating this campaign, we saw a <a href=\"https:\/\/twitter.com\/gwillem\/status\/1098606425872498690\" target=\"_blank\" rel=\"noopener\">tweet<\/a> by Willem de Groot noting a recent increase in skimmers related to <em>googletagmanager[.]eu<\/em>,\u00a0<a href=\"https:\/\/twitter.com\/gwillem\/status\/1098926474571235329\" target=\"_blank\" rel=\"noopener\">tied to Adminer<\/a>, a database management utility. The shopping site on which we started our research was compromised only a few days ago. Without server logs and the ability to perform a forensic investigation, we can only assume it was hacked in one of many possible scenarios, including the Adminer\/MySQL flaw or brute forcing the password.<\/p>\n<h3>Multiple weaknesses<\/h3>\n<p>There are many different weaknesses in this ecosystem that can be exploited. From website owners not being diligent with security updates or their passwords, to end users running infected computers turned into bots and unknowingly helping to hack web portals.<\/p>\n<p>As always, it is important to keep web server software up-to-date and augment this protection by using a web application firewall to fend off new attacks. There are different methods to thwart brute force attacks, including the use of the <em>.htaccess<\/em> file to <a href=\"https:\/\/magento.com\/security\/best-practices\/protect-your-magento-installation-password-guessing-new-update\" target=\"_blank\" rel=\"noopener\">restrict which IP address<\/a> is allowed to log in.<\/p>\n<p>Skimmers are a real problem for online shoppers who are becoming more and more wary of entering their personal information into e-commerce websites. While victims may not know where and when theft happened, it does not bode well for online merchants when their platform has been compromised.<\/p>\n<p>Malwarebytes detects the malware used in these attacks and blocks the skimmer gate.<\/p>\n<p><em>With additional contributions from <a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener\">@hasherezade<\/a>.<\/em><\/p>\n<h3>Indicators of Compromise (IOCs)<\/h3>\n<p>Skimmer domain<\/p>\n<pre>googletagmanager[.]eu<\/pre>\n<p>Delphi downloader<\/p>\n<pre>cbe74b47bd7ea953268b5df3378d11926bf97ba72d326d3ce9e0d78f3e0dc786<\/pre>\n<p>Delphi C2<\/p>\n<pre>snaphyteplieldup[.]xyz  tolmets[.]info  serversoftwarebase[.]com<\/pre>\n<p>Golang bruteforcer<\/p>\n<pre>fdc3e15d2bc80b092f69f89329ff34b7b828be976e5cbe41e3c5720f7896c140<\/pre>\n<p>Similar Golang bruteforcers<\/p>\n<pre>46fd1e8d08d06cdb9d91e2fe19a1173821dffa051315626162e9d4b38223bd4a  05073af551fd4064cced8a8b13a4491125b3cd1f08defe3d3970b8211c46e6b2  fdc3e15d2bc80b092f69f89329ff34b7b828be976e5cbe41e3c5720f7896c140  96a5b2a8fdc28b560f92937720ad0dcc5c30c705e4ce88e3f82c2a5d3ad085aa  81bd819f0feead6f7c76da3554c7669fbc294f5654a8870969eadc9700497b82  5e7581e3c8e913fe22d56a3b4b168fd5a9f3f8d9e0d2f8934f68e31a23feabd5  d87b4979c26939f0750991d331896a3a043ecd340940feb5ac6ec5a29ec7b797  36d62acd7aba4923ed71bfd4d2971f9d0f54e9445692b639175c23ff7588f0a7  7db29216bcb30307641b607577ded4a6ede08626c4fa4c29379bc36965061f62  4e18c0b316279a0a9c4d27ba785f29f4798b9bbebb43ea14ec0753574f40a54f  91a696d1a0ef2819b2ebb7664e79fa9a8e3d877bedcb5e99f05b1dc898625ed5  8b1b2dee404f274e90bd87ff6983d2162abee16c4d9868a10b802bd9bcbdbec6  046c5b18ec037ec5fbdd9be3e6ee433df3e4d2987ee59702b52d40e7f278154d  6b79345a2016b2822fd7f7bed51025b848b37e026d4638af59547e67078c913e  181ebf89a32a37752e0fc96e6020aa7af6dbb00ddb7ba02133e3804ac4d33f43  5efd1a27717d3e41281c08f8c048523e43b95300fb6023d34cb757e020f2ff7f  5dccce9b5611781c0edee4fae015119b49ce9eb99ee779e161ec0e75c1c383da<\/pre>\n<p>C2 server<\/p>\n<pre>5.45.69[.]149:7000<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/\">New Golang brute forcer discovered amid rise in e-commerce attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 26 Feb 2019 16:00:08 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/' title='New Golang brute forcer discovered amid rise in e-commerce attacks'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/shutterstock_544320883.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>E-commerce sites are a hot commodity these days. We dig into how compromised PCs are helping to hack into them to inject skimmers, whether via vulnerabilities in the websites themselves or through a new malware we discovered gaining entry via brute force.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bot\/\" rel=\"tag\">Bot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bruteforce\/\" rel=\"tag\">bruteforce<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/golang\/\" rel=\"tag\">Golang<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/googletagmanager\/\" rel=\"tag\">googletagmanager<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magento\/\" rel=\"tag\">magento<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmer\/\" rel=\"tag\">skimmer<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/' title='New Golang brute forcer discovered amid rise in e-commerce attacks'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/\">New Golang brute forcer discovered amid rise in e-commerce attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10500,10410,21043,10719,21044,19622,12370,19623,10494],"class_list":["post-14695","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bot","tag-botnet","tag-bruteforce","tag-golang","tag-googletagmanager","tag-magecart","tag-magento","tag-skimmer","tag-threat-analysis"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14695"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14695\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}