Magento Users Beware: Update Your Software Now, Hackers Targeting Credit Cards
Table of Contents
- By Dawna M. Roberts
- Nov 13, 2020
Cybercriminals hacked more than 28,000 online shopping carts built on Magento Software. If your website runs on Magento, you should update your version immediately.
Who Was Behind It?
The Hacker News reported yesterday that many attacks have occurred on e-shops running Magento version 1.x, an outdated version. RiskIQ research analysts published a report saying this about the incident “This group has carried out a large number of diverse Magecart attacks that often compromise large numbers of websites at once through supply chain attacks, such as the Adverline incident or through the use of exploits such as in the September Magento 1 compromises.”
The hacks were a well-organized attack nicknamed “Carbleed” that affected 2,806 e-carts using Magento 1.x that expired without further support on June 20, 220. RiskIQ has identified the hacker group Magecart Group 12 as the culprits due to their signature operations and domains used in the skimming technique.
How it Was Done
The type of attack used was formjacking, where hackers inject JavaScript code into vulnerable areas of the shopping cart. The software then skims credit card details whenever a shopper processes their payment, and it sends that information to the hacker’s server.
First discovered by Sansec, Carbleed works by downloading a file called “mysql.php,” which then runs installing skimmer code into the “prototype.js” file and then deletes itself.
Magecart was linked to another skimming campaign in May of this year, where hackers used a favicon file to hide malicious code.
As fast as authorities can take down the criminal domains, new ones pop up in their place, and hackers keep adjusting their operations. RiskIQ commented that “Since the [Cardbleed] campaign was publicized, the attackers have shuffled their infrastructure. They moved to load the skimmer from ajaxcloudflare[.]com, which has also been active since May and moved the exfiltration to a recently registered domain, consoler[.]in.”
Hackers Taking the Reigns
This latest hacking incident illustrates the vast network of cybercriminals using various sophisticated techniques that remain fluid to keep their operations secret while carrying out criminal activity.
The developers of Magento 1 have created a patch that users can download, which plugs this current exploit. However, routinely updating software is just not enough. Threat researchers recommend keeping a close eye on file inventory stored on web servers and logging and inspecting any minute changes to any files. A watchdog approach could have prevented customers of the 2,800+ shopping carts from having their credit card numbers stolen.
The responsibility falls on the shop owners, web developers, and hosting companies to institute better security protocols and processes that monitor and alert owners of any changes with their websites. Jordan Herman of RiskIQ said, “Ultimately, the best way to prevent these types of cyber attacks is for e-commerce shops having a full inventory of the code running on their site so they can identify deprecated versions of software and any other vulnerabilities that could invite a Magecart attack.”
As shoppers, the public wants to know they are safe. In the wake of vast data breaches, even some retail payment kiosks and online shopping carts make it much harder to feel comfortable about pulling out that credit card to pay.