Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Malware

7/11/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Magecart Group Seen as Hidden Hand Behind Ticketmaster Attack

By targeting third-party vendors that Ticketmaster uses to help process payment, the Magecart group appears to be expanding the scope of its cybercrimes, according to RiskIQ.

The attack against Ticketmaster that came to light at the end of June is bigger than initially perceived. Thought to be a relatively simple compromise of one of their service providers, RiskIQ has found that the Ticketmaster exploit was just a symptom of a far wider theft ring.

In a new report, RiskIQ analysts believe this attack was mounted by the threat group Magecart and can affect over 800 e-commerce sites around the world. They have identified nearly 100 top-tier victims, mainly online shops of some of the largest brands in the world.

Magecart has been around since 2015. This new effort by the group shows a change in strategy from focusing on piecemeal compromises -- its previous way of doing things -- to targeting third-party providers, allowing the threat actors to conduct more widespread compromises of card data.

In short, the group has moved to "supply chain" attacks.

The RiskIQ report finds that Ticketmaster was not directly compromised or breached itself --but a third-party supplier for its website known as Ibenta was. Further, researchers write that Magecart actors breached Ibenta systems and, in separate instances, either added to or completely replaced a custom JavaScript module Ibenta made for Ticketmaster with the group's own digital skimmer code.

But RiskIQ also found that Inbenta wasn't the only third-party provider of Ticketmaster that Megacart compromised. In December, researchers found that the Magecart skimmer was added to scripts used by SociaPlus -- another third party analytics provider -- and then injected into multiple Ticketmaster websites.

PushAssist, a SaaS firm that provides analytics for websites, also has an active skimmer similar to the Ticketmaster one running, according to RiskIQ. Researchers believe that any website performing payment processing on a website that uses PushAssist is at this moment vulnerable to the Magecart skimmer.

The PushAssist service boasts having over 10,000 websites using its analytics platform.

Another third party that RiskIQ found to be compromised was Clarity Connect. It provides a content management system (CMS) for company owners to create an online presence with a website or web store. The websites built by its CMS will pull resources from "console.clarity-connect.com," a site compromised by the Magecart actors.


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

Magecart has even gotten rather snotty with Clarity. The group told the company that if the skimmer code is removed one more time that the company's sites will be encrypted. But Clarity Connect's customers are affected by this malware, so removal may be unavoidable.

Annex Cloud is another analytics provider that is currently compromised, according to RiskIQ.

It seems that Magecart actors have been active since for at least three years, and have been dangerous since then. RiskIQ notes in their report that the group "have continually refined their tactics and targets to maximize the return on their efforts." The group appears to have grown more sophisticated and successful in its crimes.

This isn't over. The Magecart actors are still in action and greatly affecting a wide swath of e-commerce. The group remains an ongoing threat.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.