Skimmers write actual spaghetti code... In an unexpected plot twist, card-stealing malware was disguised as Italian cuisine. #magecart#webskimmer 1/3
Normally criminals go out of their way to hide their work, but this pasta fan didn't seem to care. Also, the card collection server is pizdasniff[.]site, which is proper Russian for "pussyskimmer". 2/3
Despite its glaring presence, the skimmer has been injected in numerous sites since Dec 12th and most are still active. We have reached out to all affected merchants.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
More than 350 ecommerce stores infected with malware in a single day.
Today our global crawler discovered 374 ecommerce stores infected with the same strain of malware. 370 of these stores load the malware via https://naturalfreshmall[.]com/image/pixel[.]js.
Another batch got hacked last night, bringing the total to 461 compromised stores.
The Natural Fresh skimmer shows a fake payment popup, defeating the security of a (PCI compliant) hosted payment form. Payments are sent to https://naturalfreshmall[.]com/payment/Payment.php #masshack
UPDATE Nearly 2000 Magento stores got hacked over the weekend, which is - by far - the largest automated campaign to date. Malware loader: mcdnn[.]net. Exfil: imags[.]pw
Possibly linked to a Magento 1 0day exploit that was put up for sale for $5000 a few weeks ago
Malware was injected using US IP 92.242.62[.]210. They used the Magento Connect feature to install code, including a file called "mysql.php", which was called and immediately removed.
Indonesian police arrests 3 Magecart hackers who ran skimming operation since 2017. They recently registered "magecart[.]net" for payment interception. sansec.io/labs/2020/01/2…
One suspect admitted on live television that he had injected payment skimmers on foreign stores since 2017. He claimed to have earned enough money "to buy a jacket".
Police reports 12 cases, but Sanguine identified 571 hacks with this groups modus operandi since 2017. They could be identified because of an odd debug message "Success gan!" (success bro) upon successful payment interception.