Hackers are using Google Tag Manager (GTM) to inject credit card skimmers into E-commerce sites.
At least 6 compromised sites identified so far. Here's what we're seeing. 👇
Malicious GTM script reference (GTM-MLHK2N68) stored in Magento's cms_block.content table.
Attackers using GTM as delivery mechanism to bypass security controls.
Obfuscated JS skimmer activates on checkout pages, exfiltrating card data to C2 domain eurowebmonitortool[.]com.
Additional persistence achieved via PHP backdoor in media/index.php allowing remote code execution through base64-encoded commands.
Gives attackers ongoing access post-cleanup.
This campaign bears striking similarity to 2021 GTM-based Magecart operation that hit 316 sites and compromised 88,000 cards.
Same core TTPs being recycled.
Why GTM works so well for attackers:
- Auto-executes JS
- Trusted Google infrastructure
- Security tools typically allow list
- Dynamic updates without site access
This is familiar territory for me, remembering my 2013 Million Browser Botnet talk @ Blackhat where me and @jeremiahg demonstrated JavaScript injection via ad networks.
Same concept, different delivery mechanism.
@jeremiahg IOCs to watch for:
- Suspicious GTM container IDs
- Unexpected scripts in cms_block.content
- PHP files in media directory
- Unusual outbound connections during checkout flows
Hackers claim to have compromised Gravy Analytics, exposing millions of smartphone location records—including data sold to U.S. government agencies.
This could be the first major breach of a location data broker. Here’s what you need to know 👇
Potential impact:
- Precise GPS coordinates + timestamps on millions of people
- User movement classifications ("LIKELY_DRIVING")
- Customer lists (Apple, Uber, Equifax & more)
- Root access to Gravy's servers, control of domains, and Amazon S3 buckets
For years, firms like Gravy have sold location data to military, DHS, and even the FBI. Now hackers claim to have access dating back to 2018.
Potential risks:
- De-anonymization of individuals
- Tracking high-risk people
- Exposure of schools, clinics, and more
(img: EFF)
New series of Palo Alto Networks vulnerabilities, chained together for a bad time.
“We find that a simple request to that exact endpoint over the web service resets the admin password.”
Well, I don’t like the sound of that… 🧵
First up -
CVE-2024-9464 is an OS command injection vulnerability in Palo Alto Networks Expedition
This allows an authenticated attacker to run arbitrary OS commands as root
Next -
CVE-2024-9465 is an SQL injection vulnerability in Palo Alto Networks Expedition
This allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys.
Woah. Millions of cars can be hacked just by knowing the license plate number.
This is done through a simple web app bug too, no complicated car hacking involved.
I also don't think it's fixed yet... 🧵
The bug seems to impact all Kias right now and the researchers didn't disclose a PoC since it isn't fixed but it's been 90 days since disclosure so they're talking about it.
With just a license plate number, they found a way to use the web portal that dealers and customers use to setup smart car features to ...do a lot more.
Including unlocking, tracking location, even starting the car.