Malwarebytes’ researchers are closely monitoring web skimmers and have noticed that one of the infamous Magecart groups is causing a rise in the number of attacks while gobbling up over a quarter of the total number of attacks in one campaign.
Magento is an Adobe company that offers a hosted and self-hosted content management system (CMS) for web shops. The free version of Magento is open source which offers users the option to make their own changes and allows specialists to create extensions for the CMS.
Magento 1 has reached end-of-life (EOL) and has not been supported since June 30, 2020. However, the platform is still in use by thousands of online stores. And because there’s a lack of security patches from Adobe, some are using community-provided patches. As you can imagine, the lack of vendor provided patches makes stores running Magento 1 popular victims for skimmers like Magecart.
From a research standpoint, we have observed certain shifts in the scope of attacks. For instance, different threat actors are continuing to expand and diversify their methods and infrastructure. In a blog post about Magecart Group 8, we documented some of the web properties used to serve skimmers and exfiltrate stolen data.
In recent news we reported about the Segway online store that was compromised by Magecart group 12 who embedded the skimmer code inside a favicon.ico file.
According to the Sansec research the skimmers abused a known leak in the Quickview plugin that is typically used to inject rogue Magento admin users. In this case, the skimmers used it to add a validation rule that they could later trigger by registering as a customer. In investigated cases the attacker left no less than 19 backdoors on the system.
Keeping your site safe
We have written an extensive post about how to defend your website against skimmers, but in summary, here’s what you need to do to keep your site safe:
- Make sure that the systems from where the site is administered are clean of malware.
- Use strong passwords and do not reuse them.
- Limit the number of administrators.
- Keep your site’s software updated.
- Use a Web Application Firewall (WAF).
- Know that each dependency is a potential backdoor into your web pages.
- Use a Content Security Policy (CSP).
- Make sure you are made aware in case of problems, either by checking yourself or by having it done for you.
Stay safe, everyone!
Go to Source of this post
Author Of this post: Pieter Arntz