, 15 tweets, 15 min read
My Authors
Read all threads
:: Magecart Hunting Thread ::

This is a thread about how to hunt and find #Magecart infected sites using @URLscan. 💰💵

♻️Please retweet to help spread knowledge and feel free to add your own techniques, ideas, and suggestions.

⚠️THREAD⚠️
A brief overview of Magecart.

Magecart is an umbrella term for the technique of injecting JavaScript to steal credit card numbers on E-commerce sites. A number of actors/groups operate under the same term implanting JavaScript onto checkout pages all over the world.
To get started we need a foothold.
I have a hunt running looking for a known Magecart hash.

This morning a new site hit the search, looking at the site I then used the filename as a pivot. The filename which is infected with Magecart is "jquery_noconflict.js"
Using this filename as a pivot we can find other sites using a file with the same name.

The second site listed ':/www.shopatsimba.com' requires further analysis I think.
Initial analysis needs to check the domain tree to see what domains the site calls out to when loading.

There are three which require further analysis:
- :/images-amazon.com
- :/jquerycdnlib.at
- :/gnogle.ru
It turns out, 'images-amazon' is legitimate and owned by Amazon.
Sadly, the same can't be said about the other two domains identified which appear highly suspicious.
Starting with 'gnogle' - The site returned 0 Bytes, so for now this site is a dead end; however, it is worth keeping in mind and using as a pivot for another investigation in the future.
Moving our attention to 'jquerycdnlib'

URL🌐- hxxps://jquerycdnlib.at
IP - 217.8.117.42
TLS🔐- @letsencrypt
Looking at the HTTP resources on the e-commerce site for the transaction details to the domain that is being analysed.

The file requested from this domain is called '5c3a398f10058.js'
Looking at the JavaScript code it becomes clear this is a Magecart script, it searches for credit card information, and then sends this data back to the domain it was loaded from.
Without fully deobfuscating the script we will not know the full capabilities of the script. However, it is clear at this point that 'shopatsimba' is infected with Magecart and all card details are being stolen when they are entered into the site.
We can continue to hunt this script using the hash, the file name, and also looking into the IP address to see if any further scripts can be found.

But that is for you to do!
If you have any questions or want to chat, my DM's are open to enable me to talk to cool people.

If you enjoyed this thread then why not check out my other threat hunting threads:
-
-
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Jake

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!