Malicious code was found hidden inside graphics files on the storage container maker's e-commerce website.
Tupperware famously locks in food's freshness, but hackers could not be locked out of the company's e-commerce site. The primary Tupperware site, along with several localized versions, were compromised by digital credit card skimmer disguised inside an image file.
Researchers at Malwarebytes Labs discovered the malicious code when they noticed an anomaly in an iframe container. While the researchers say they don't know what the infection vector was, the malicious campaign is ongoing and, at press time, still active.
The researchers note several details in the malicious code that indicate attackers less polished in their craft than other well-known criminal gangs are involved.
"This does indeed sound like the work of a new cybergang that has not scaled operations yet," Mounir Hahad, head of Juniper Threat Labs at Juniper Networks, told Dark Reading. "The domain name they chose to register was not customized to blend into their target victim's normal website operations, and based on DNS resolution telemetry, it does not seem to have reached any meaningful scale. Nonetheless, this may be the blueprint of future similar attacks on other websites."
Read more here.
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "What Should I Do If Someone Is Impersonating My Company in a Phishing Campaign?"
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024