Hackers Use Video Players in Websites to Steal Sensitive User Information

On real estate websites recently the threat actors have placed a malicious script that steals sensitive data, that is entered by the user in the targeted website.

Here in this event, the hackers have targeted the cyberattacks on supply chains, and to perform this, they have used a cloud-based video hosting service. 

A research unit of Palo Alto Networks, Unit 42 has reported that hackers are insinuating malicious JavaScript code into videos. And at this point when the video is imported to other sites in which the skimmer codes are embedded.

Moreover, the hackers have compromised more than 100 real estate websites in this malicious campaign which clearly depicts that it’s a clear successful supply chain attack.

Infecting multiple by hacking once

Apart from this, Skimmer attacks are also known as formjacking, and in these cyber attacks, the hackers inject malicious JavaScript into a target website. Here they target the checkout or payment pages on shopping and e-commerce portals to steal sensitive user data like:-

  • Debit Card Information
  • Credit Card information
  • Email
  • Physical Address
  • Date of Birth
  • CC CVV
  • DC CVV
  • Name
  • Phone Number

The websites that are in question are owned by the same parent company, and the experts at Unit 42 have not disclosed the name of the company. What they did is they helped the company to remove the malware.

To include a malicious skimmer script the hackers modified the upstream JavaScript file and gained access to it. Now once done with this, the video player starts serving malicious script since the hackers keep the next player update loaded with malicious script.

The real estate website that had the player embedded are served with the malicious script through which the threat actors steal all the sensitive user inputs that are made by the users into the website forms.

Operational process

Here we have simplified the operational process of it in a few simple steps, and here we have mentioned below:-

  • First of all, it checks whether the webpage load is done or not.
  • Then it calls the next function.
  • After that, from the HTML document, it read and steals all the user inputs.
  • Once done with the above step, now it calls a data-validating function before saving it.
  • Lastly, by creating an HTML tag and filling the image source with the server URL, all the stolen data collected are sent to the C2 (https://cdn-imgcloud[.]com/img).

So, the experts have strongly recommended website admins to not trust blindly all the JavaScript scripts that are embedded on their sites.

While what they have advised admins to follow is regularly conduct web content integrity checks, and along with that use form-jacking detection solutions.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Ex-Cybersecurity Consultant Jailed For Trading Confidential Data

Vincent Cannady, a professional who used to work as a consultant in the cybersecurity field, has been taken into custody…

13 hours ago

Mal.Metrica Malware Hijacks 17,000+ WordPress Sites

Infected websites mimic legitimate human verification prompts (CAPTCHAs) to trick users, who often request seemingly innocuous clicks, resembling past CAPTCHA…

1 day ago

Hackers Exploit Microsoft Graph API For C&C Communications

An emerging threat leverages Microsoft's Graph API to facilitate command-and-control (C&C) communications through Microsoft cloud services.  Recently, security analysts at…

1 day ago

ApacheMQ Authentication Flaw Let Unauthorized Users Perform Multiple Actions

Apache ActiveMQ is a Java based communication management tool for communicating with multiple components in a server. It is an…

1 day ago

68% of Data Breach Occurs Due to Social Engineering Attacks

In the latest edition of Verizon's Data Breach Investigations Report (DBIR) for 2024, a concerning trend has been highlighted, a…

1 day ago

U.S. Govt Warns of Massive Social Engineering Attack from North Korean Hackers

The United States government has issued a stark warning about a new wave of social engineering attacks orchestrated by North…

1 day ago