Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Malware

7/11/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Magecart Group Seen as Hidden Hand Behind Ticketmaster Attack

By targeting third-party vendors that Ticketmaster uses to help process payment, the Magecart group appears to be expanding the scope of its cybercrimes, according to RiskIQ.

The attack against Ticketmaster that came to light at the end of June is bigger than initially perceived. Thought to be a relatively simple compromise of one of their service providers, RiskIQ has found that the Ticketmaster exploit was just a symptom of a far wider theft ring.

In a new report, RiskIQ analysts believe this attack was mounted by the threat group Magecart and can affect over 800 e-commerce sites around the world. They have identified nearly 100 top-tier victims, mainly online shops of some of the largest brands in the world.

Magecart has been around since 2015. This new effort by the group shows a change in strategy from focusing on piecemeal compromises -- its previous way of doing things -- to targeting third-party providers, allowing the threat actors to conduct more widespread compromises of card data.

In short, the group has moved to "supply chain" attacks.

The RiskIQ report finds that Ticketmaster was not directly compromised or breached itself --but a third-party supplier for its website known as Ibenta was. Further, researchers write that Magecart actors breached Ibenta systems and, in separate instances, either added to or completely replaced a custom JavaScript module Ibenta made for Ticketmaster with the group's own digital skimmer code.

But RiskIQ also found that Inbenta wasn't the only third-party provider of Ticketmaster that Megacart compromised. In December, researchers found that the Magecart skimmer was added to scripts used by SociaPlus -- another third party analytics provider -- and then injected into multiple Ticketmaster websites.

PushAssist, a SaaS firm that provides analytics for websites, also has an active skimmer similar to the Ticketmaster one running, according to RiskIQ. Researchers believe that any website performing payment processing on a website that uses PushAssist is at this moment vulnerable to the Magecart skimmer.

The PushAssist service boasts having over 10,000 websites using its analytics platform.

Another third party that RiskIQ found to be compromised was Clarity Connect. It provides a content management system (CMS) for company owners to create an online presence with a website or web store. The websites built by its CMS will pull resources from "console.clarity-connect.com," a site compromised by the Magecart actors.


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

Magecart has even gotten rather snotty with Clarity. The group told the company that if the skimmer code is removed one more time that the company's sites will be encrypted. But Clarity Connect's customers are affected by this malware, so removal may be unavoidable.

Annex Cloud is another analytics provider that is currently compromised, according to RiskIQ.

It seems that Magecart actors have been active since for at least three years, and have been dangerous since then. RiskIQ notes in their report that the group "have continually refined their tactics and targets to maximize the return on their efforts." The group appears to have grown more sophisticated and successful in its crimes.

This isn't over. The Magecart actors are still in action and greatly affecting a wide swath of e-commerce. The group remains an ongoing threat.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15820
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.
CVE-2020-15821
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft.
CVE-2020-15823
PUBLISHED: 2020-08-08
JetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.
CVE-2020-15824
PUBLISHED: 2020-08-08
In JetBrains Kotlin before 1.4.0, there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
CVE-2020-15825
PUBLISHED: 2020-08-08
In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges.