Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Malware

7/11/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Magecart Group Seen as Hidden Hand Behind Ticketmaster Attack

By targeting third-party vendors that Ticketmaster uses to help process payment, the Magecart group appears to be expanding the scope of its cybercrimes, according to RiskIQ.

The attack against Ticketmaster that came to light at the end of June is bigger than initially perceived. Thought to be a relatively simple compromise of one of their service providers, RiskIQ has found that the Ticketmaster exploit was just a symptom of a far wider theft ring.

In a new report, RiskIQ analysts believe this attack was mounted by the threat group Magecart and can affect over 800 e-commerce sites around the world. They have identified nearly 100 top-tier victims, mainly online shops of some of the largest brands in the world.

Magecart has been around since 2015. This new effort by the group shows a change in strategy from focusing on piecemeal compromises -- its previous way of doing things -- to targeting third-party providers, allowing the threat actors to conduct more widespread compromises of card data.

In short, the group has moved to "supply chain" attacks.

(Source: Flickr)
(Source: Flickr)

The RiskIQ report finds that Ticketmaster was not directly compromised or breached itself --but a third-party supplier for its website known as Ibenta was. Further, researchers write that Magecart actors breached Ibenta systems and, in separate instances, either added to or completely replaced a custom JavaScript module Ibenta made for Ticketmaster with the group's own digital skimmer code.

But RiskIQ also found that Inbenta wasn't the only third-party provider of Ticketmaster that Megacart compromised. In December, researchers found that the Magecart skimmer was added to scripts used by SociaPlus -- another third party analytics provider -- and then injected into multiple Ticketmaster websites.

PushAssist, a SaaS firm that provides analytics for websites, also has an active skimmer similar to the Ticketmaster one running, according to RiskIQ. Researchers believe that any website performing payment processing on a website that uses PushAssist is at this moment vulnerable to the Magecart skimmer.

The PushAssist service boasts having over 10,000 websites using its analytics platform.

Another third party that RiskIQ found to be compromised was Clarity Connect. It provides a content management system (CMS) for company owners to create an online presence with a website or web store. The websites built by its CMS will pull resources from "console.clarity-connect.com," a site compromised by the Magecart actors.


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

Magecart has even gotten rather snotty with Clarity. The group told the company that if the skimmer code is removed one more time that the company's sites will be encrypted. But Clarity Connect's customers are affected by this malware, so removal may be unavoidable.

Annex Cloud is another analytics provider that is currently compromised, according to RiskIQ.

It seems that Magecart actors have been active since for at least three years, and have been dangerous since then. RiskIQ notes in their report that the group "have continually refined their tactics and targets to maximize the return on their efforts." The group appears to have grown more sophisticated and successful in its crimes.

This isn't over. The Magecart actors are still in action and greatly affecting a wide swath of e-commerce. The group remains an ongoing threat.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-22392
PUBLISHED: 2021-08-05
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.
CVE-2021-3591
PUBLISHED: 2021-08-05
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2021-3642
PUBLISHED: 2021-08-05
A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality. This flaw affectes Wildfly Elytron versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final.
CVE-2021-3655
PUBLISHED: 2021-08-05
A vulnerability was found in the Linux kernel in versions before v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
CVE-2021-32003
PUBLISHED: 2021-08-05
Unprotected Transport of Credentials vulnerability in SiteManager provisioning service allows local attacker to capture credentials if the service is used after provisioning. This issue affects: Secomea SiteManager All versions prior to 9.5 on Hardware.