


"So the particular mitigation would be to upgrade to Magento 2, though the cost of upgrading might be prohibitive for smaller vendors." "The prompting for this research was the widespread compromise of Magento 1, which went end-of-life this June, sites via an exploit," Herman said. If anything, the attacks are yet another indication of threat actors continuing to innovate, playing with different ways of carrying out skimming, and obfuscating their code to evade detection, said RiskIQ threat researcher Jordan Herman.

"They moved to load the skimmer from ajaxcloudflarecom, which has also been active since May and moved the exfiltration to a recently registered domain, consolerin." "Since the campaign was publicized, the attackers have shuffled their infrastructure," RiskIQ researchers said. What's more, the skimmer used in the compromises is a variant of the Ant and Cockroach skimmer first observed in August 2019 - so named after a function labeled "ant_cockcroach()" and a variable "ant_check" found in the code. Now, as per RiskIQ, the attacks bear all the hallmarks of a single group it tracks as Magecart Group 12 based on overlaps in infrastructure and techniques across different attacks starting with Adverline in January 2019 to the Olympics Ticket Resellers back in February 2020.
CASHBACK SCRIPT MAGENTO INSTALL
But in the last few months, the Magecart operators have stepped up in their efforts to hide card stealer code inside image metadata and even carry out IDN homograph attacks to plant web skimmers concealed within a website's favicon file.Ĭardbleed, which was first documented by Sansec, works by using specific domains to interact with the Magento admin panel and subsequently leveraging the 'Magento Connect' feature to download and install a piece of malware called "mysql.php" that gets automatically deleted after the skimmer code is added to "prototype.js."
