Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/10/2019
12:05 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Magecart Attack on Volusion Highlights Supply Chain Dangers

Attackers compromised Volusion's Google Cloud environment to load malicious skimmer code onto more than 6,500 customer sites.

Magecart attackers have infiltrated cloud-based e-commerce provider Volusion to successfully infect at least 6,500 customer websites with malicious code designed to lift payment card information. To do this, they had to first break into Volusion's Google Cloud environment.

Volusion is the latest target of Magecart, a threat that was first spotted a decade ago but has been ramping up over the past couple of years as attackers explore new vectors for compromise and it becomes easier to rent a skimmer kit, track malicious activity, and automate attacks at scale. Skimmers have been detected on more than two million sites, RiskIQ reports.

"During our investigations of Magecart, we have found that the attackers seem more experienced and thoughtful than many other skimmer groups," Trend Micro researchers say in an interview with Dark Reading. "There are multiple Magecart actor groups who continually shift their tactics to improve their infection rates and revenue opportunities."

An attacker could launch a Magecart operation by purchasing an exploit and injecting malicious JavaScript onto a vulnerable e-commerce website. In the case of Volusion, attackers targeted the infrastructure of one company to compromise thousands of online stores' checkout pages. 

Volusion has issued a statement confirming it was alerted to a security incident and resolved the problem "within a few hours of notification." It has taken steps to help secure accounts and is working with authorities on the matter.

"A limited portion of customer information was compromised from a subset of our merchants," a spokesperson says. "This included credit card information, but not other associated personally identifying details. We are not aware of any fraudulent activity connected to this matter."

Marcel Afrahim, a security researcher with Check Point, first spotted a red flag on his virtual shopping trip to the Sesame Street Live Store. The store is built with Volusion's All-in-One E-commerce Website Builder; Volusion also provides the store's name servers. During checkout, he noticed a JavaScript file being loaded from storage.googleapis.com with the bucket name "volusionapi." It was the only external JavaScript being loaded from a random storage site.

As Afrahim explains, storage.googleapis.com is a Google Cloud Storage domain name for a file storage web service. Anyone can register, pick a bucket name, and serve their own content.

A closer look at this code revealed a script that was posting credit card information from the checkout page to another domain name and calling it "JavaScript Cookie." The code was masked as a simple API for handling cookies, but analysis revealed additional code with two sections. One reads the values entered in Credit Card fields; after a series of checks, it's encoded in Base64 and stored in "sessionStorage," which is cleared when a page session ends.

The second part of the script reads the stored data and posts it to the attackers' primary server: hxxps://volusion-cdn.com/analytics/beacon. As Afrahim points out, even an analyst may look past a domain name like this, designed to blend in with Volusion. A GET request to Volusion-Cdn[.]com redirects to a legitimate Volusion CDN. However, he discovered the domain was only registered on September 7 and has nothing in common with Volusion infrastructure or name servers.

"While it is not overly sophisticated, the actors behind this operation went through some lengthy steps to make the traffic look normal," Afrahim writes in a blog post on his findings. Further analysis revealed the Sesame Street Store is not the only one affected by the malicious JavaScript. Most likely, Afrahim says, any e-commerce website hosted on Volusion is running malicious code and sharing credit card input with the external attacker-controlled domain.

The Volusion incident can most likely be attributed to Magecart Group 6, also known for last year's attack on British Airways, says Jerome Segura, head of threat intelligence at Malwarebytes. "They target sites that generate a lot of transactions, which helps them maximize their attack in a short time frame," he explains.

Group 6 was recently identified as the FIN6 APT. Part of their tactics, techniques, and procedures involves creating exfiltration domains that mimic their victim, which aligns with their efforts to blend in and evade detection.

Service Providers Are Hot Targets
This isn't the first time that attackers have taken advantage of legitimate service providers to spread malicious code. Back in May, attackers injected obfuscated JavaScript into three marketing services to scrape information, including login data and credit card details, from thousands of websites. Anyone who visited a website that used the three tools was affected in the attack.

A September Magecart attack targeted the booking websites of chain-brand hotels, marking the second time Trend Micro saw attackers hitting e-commerce service providers instead of individual shops. In May, another skimming campaign hit the online stores of college campuses.

Adversaries are after the most accessible entry point. Many have targeted misconfigured AWS accounts because they're the most obvious opening that will likely be unnoticed, but ultimately they'll go after the vector that will give them the highest payout with the fewest resources.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Can the Girl Scouts Save the Moon from Cyberattack?"

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3035
PUBLISHED: 2021-04-20
An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.26. Checkov 1.0 versions are not impacted.
CVE-2021-3036
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to us...
CVE-2021-3037
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS conf...
CVE-2021-3038
PUBLISHED: 2021-04-20
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions...
CVE-2021-3506
PUBLISHED: 2021-04-19
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The hi...