Magecart Used Same Skimmer against Two Web-Based Suppliers

Magecart Used Same Skimmer against Two Web-Based Suppliers
Magecart threat actors used the same skimmer against two web-based suppliers to try to steal users’ payment card information.The first attack occurred at 15:56:42 GMT on 10 May when bad actors injected the skimmer into the bottom of a script used by enterprise content management system CloudCMS. This malicious action targeted version 1.5.23 of the script, which limited the scope of this attack. According to RiskIQ, version 1.5.23 affects just 20 percent of sites using CloudCMS.Even then, RiskIQ observed that only a few hundred websites were using CloudCMS scripts at the time of detection. Those using the affected version of the script were less numerous still.

A view of the Magecart skimmer inserted into the bottom of the CloudCMS script. (Source: RiskIQ)The Magecart attackers also leveraged the script against analytics provider Picreel. In that instance, they inserted the skimmer at the bottom of a script used by Picreel to track user behavior. But the attackers made a mistake in that they broke the file’s JavaScript syntax, which caused the script to not execute in certain browsers.In contrast to the CloudCMS case, RiskIQ found that hundreds of sites were using the affected script. But the issue described above likely limited the number of times that the skimmer was able to execute in a user’s browser.

The Magecart skimmer affecting Picreel. (Source: RiskIQ)RiskIQ believes that these two instances highlight how bad actors are increasingly becoming more efficient in their ability to launch supply chain attacks. This is concerning given the limited visibility which many organizations possess over their web-facing attack surface. As the firm explains in a blog post:… [I]t takes less time than ever for consumers to see their data stolen, seemingly out of nowhe ..

Support the originator by clicking the read the rest link below.