Over 100 online stores have been compromised with a new type of web malware called Magecart that secretly logs data entered on checkout pages and sends it to the attacker’s server.
First signs of this malware appeared in March 2016, but activity started to pick up in May when the first infections started to take root at high-profile online stores.
By the end of June 2016, Sucuri had stumbled upon a variant of Magecart, of which Softpedia reported as targeting Magento stores that used the Braintree Magento extension to support payments via the Braintree platform.
The two say that, since March, the group behind the Magecart campaign have improved their capabilities, refining their malicious scripts in order to work across platforms such as Magento, OpenCart, and the Powerfront CMS.
Magecart infections take place in a two-stage process. In the first step, the script checks if the user is on the checkout page. Only when the user reaches URLs specific to each platform’s checkout page does the Magecart script move to the second stage, where it loads the actual keylogger component.
This second-stage component is another JS script, meant to log what the user enters in form fields and send the collected data to a remote server under the attacker’s control.
The scripts are loaded from domains that change from infection to infection, showing that crooks know how to hide their tracks. All scripts load via HTTPS, and the data is exfiltrated via HTTPS as well.
In cases where the checkout form doesn’t gather all the information the attacker wants, Magecart can add input fields to the site’s checkout form to collect all the data the attacker craves.
RiskIQ says Magecart can steal data from online stores that handle their own payment processing operations, or when they leave this to specialized payment solutions.
RiskIQ says Magecart was able to steal credit card information from sites that used the Braintree Magento extension or handled payments via VeriSign.
Some of the most high-profile companies that suffered Magecart infections via their online stores include Everlast and Faber & Faber. The full list of affected sites can be seen below.
The easiest way to safeguard against Magecart infections is to use complex admin credentials and to keep server and CMS software up to date.
Latest posts by TWR (see all)
- Connecting to Airport WiFi is Safe, Right?…..Wrong - December 5, 2017
- Your HP Wireless mouse can be Spoofed; Be careful - May 18, 2017
- E.U. Fines Facebook $122 Million for misleading information about WhatsApp acquisition - May 18, 2017