Cyber security news for all

More

    Unsecured AWS S3 Buckets Infected With Skimming Code

     Analysts Find Fresh Magecart Code and Redirectors to Malvertising Campaign.

    Malicious card skimming code discovered by RiskIQ suggests that cybercriminals are taking advantage of unsecured Amazon Web Devices Simple Storage Service cloud storage buckets.

    There seems to be a link between the malicious code and a cybercriminal group collectively known as Magecart.  Magecart has stolen customer details, like card numbers over the past years; and by deploying JavaScript skimmers alias JavaScript sniffers or JS sniffers on eCommerce sites.

    RiskIQ researchers found the Magecart skimming code on three websites owned by Endeavour Business Media.

    Endeavor Business Media is a website that hosts online forums for firefighters, police, and private security professionals. Researchers also found a malicious redirect to a malvertising campaign called Hookads.

    Attempts to get in touch with Endeavour have been futile up to this date. “In July 2019, RiskIQ published a report that Magecart groups are inserting malicious JavaScript into unsecured Amazon S3 buckets. At the time, the researchers identified 17,000 domains infected with JavaScript skimmers; which could steal payment card data, including name, card number, expiration date, and CVV information.”

    A threat researcher at RiskIQ told Information Security Group, “the three websites belonging to Endeavor are not effective for deploying this type of skimming code, as there is no payment data on those sites. Instead, the Magecart group seemed to be taking a “shotgun approach”; where they place malicious code anywhere and everywhere they can find without regard for success.”

    RiskIQ reports read, “as attacks involving misconfigured S3 buckets continue, knowing where your organization is using them across its digital attack surface is imperative.”

    Over the years, security researchers have warned that threat actors are mass-scanning the internet for misconfigured Amazon S3 buckets to plant card skimming and other malicious code to target a wide range of victims.

    Malicious campaign

    The researchers didn’t find only the skimming codes. A malicious redirector called “jqueryapi1oad” found is believed to be associated with the Magecart.

    According to the report, the RiskIQ analysts have previously found the jqueryapi1oad code associated with 362 malicious domains. “We believe the injection of the jqueryapi1oad malicious redirector on those 362 domains is part of one long-running campaign by an actor focused on traffic distribution; the redirect sends victims to the Hookads malvertising campaign.”

    Herman said that the Hookads malicious campaign was initially discovered in 2016; and has been linked to several other malicious activities like scam adware, exploit kits, tech support, etc.

    On the way forward, RiskIQ has advised organizations affected by the misconfigured S3 buckets to clean out the data and deploy new resources, or create a new S3 bucket, to prevent threat actors from re-installing this type of malicious code.

    Recent Articles

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Manchester United have been blackmailed by cyber attackers

    The Premier League club Manchester United fell victim to a cyber attack according to the Daily Mail. The cyber criminals are apparently demanding ransom in...

    TikTok has fixed a serious security gap issue

    TikTok accounts paid a researcher a reward of 4000 dollars after he reported two vulnerabilities as part of a disclosure. A combination of both...

    Passwords should be changed for Fortinet VPNs

    Administrators should change the access for Fortinet VPNs in use. Log-in information for almost 50,000 VPN networks has appeared in various cyber blogs. A security...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox