Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/19/2020
05:10 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Magecart Plants Card Skimmers via Old Magento Plug-in Flaw

The FBI has warned ecommerce sites about attacks targeting a more than three-year-old flaw in the Magmi mass importer.

Cybercriminals operating under the Magecart umbrella group are exploiting an old vulnerability in a Magento plugin to insert credit card data-skimming malware on sites built on the ecommerce platform.

In an alert earlier this month, the FBI described the latest attacks as involving CVE-2017-7391, a three-year old—and long since patched—cross-site scripting vulnerability in the Magmi 0.7.22 mass importer for Magento.

According to the FBI, the attackers breached a US Magento e-commerce site via the vulnerable plugin and placed malicious JavaScript code on checkout pages where users submit payment card data and personal information. The attackers also retrieved administrator credentials and downloaded web shells that allowed them to install other malware and maintain a persistent presence on the site.

The malware allowed the attackers to gather payment-card data and other information belonging to cardholders such as their names, email addresses, physical addresses, and phone numbers. The criminals encrypted the stolen data and stored it in a JPEG dump file they had created. They later used the web shell to extract the dump file using HTTP GET requests, the FBI said.

The alert provided indicators of compromise that organizations running Magento could use to protect their site against the Magecart attacks.

Pervasive Threat

Magecart is an umbrella term for a collection of at least seven separate groups that have been placing online card skimmers on hundreds of thousands of e-commerce sites worldwide over the last few years. Some estimates have pegged the number of sites that Magecart actors have comprised at more than two million.

In many cases, the skimmers have been comprised of very small pieces of JavaScript code injected into vulnerable plugins and other third-party components on e-commerce sites. Typically, the malware has worked by capturing payment card data and other PII that users enter into checkout pages and then transmitting the data to remote, attacker-controlled systems.

Hank Schless, senior manager of security solutions at Lookout, says the card-skimming malware Magecart injects into websites can be hard to spot. "Much like a Trojanized version of a legitimate mobile app appearing on an app store or a text supposedly from your bank with a normal-looking URL, malicious actors always look for ways to throw as few red flags as possible," he says. 

With a majority of people working from home and conducting a lot more transactions online than before because of the COVID-19 pandemic, expect bad actors like Magecart to ramp up their malicious activity, Schless says.

"Magecart is a perfect example of threat actors exploiting a changing risk landscape that IT and security teams have been forced to protect against," he says. The environment makes it necessary for organizations to lock down every extension of the corporate network - from payment platforms to employee mobile devices, Schless says.

Alex Guirakhoo, threat research team lead at Digital Shadows, says the surge in online activity as a result of COVID-19 has given attackers a larger attack surface. According to Guirakhoo, cybercriminals in underground forums have been actively discussing ways to take advantage of increased consumer traffic on ecommerce sites to hide their malicious activity.

"To mitigate against code-injection attacks, organizations should ensure that they monitor for any unauthorized code changes, particularly on checkout pages of e-commerce platforms," Guirakhoo notes. "Organizations should also monitor for any publicly disclosed vulnerabilities affecting any of their third-party e-commerce platforms."

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Inside North Korea's Rapid Evolution to Cyber Superpower
Kelly Sheridan, Staff Editor, Dark Reading,  12/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29565
PUBLISHED: 2020-12-04
An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the "next" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the...
CVE-2020-5675
PUBLISHED: 2020-12-04
Out-of-bounds read issue in GT21 model of GOT2000 series (GT2107-WTBD all versions, GT2107-WTSD all versions, GT2104-RTBD all versions, GT2104-PMBD all versions, and GT2103-PMBD all versions), GS21 model of GOT series (GS2110-WTBD all versions and GS2107-WTBD all versions), and Tension Controller LE...
CVE-2020-29562
PUBLISHED: 2020-12-04
The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2020-28916
PUBLISHED: 2020-12-04
hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.
CVE-2020-29561
PUBLISHED: 2020-12-04
An issue was discovered in SonicBOOM riscv-boom 3.0.0. For LR, it does not avoid acquiring a reservation in the case where a load translates successfully but still generates an exception.