[BreachExchange] Magecart Targets Emergency Services-related Sites via Insecure S3 Buckets
Destry Winant
destry at riskbasedsecurity.com
Wed Jun 10 10:22:09 EDT 2020
https://thehackernews.com/2020/06/magecart-skimmer-amazon.html
Hacking groups are continuing to leverage misconfigured AWS S3 data
storage buckets to insert malicious code into websites in an attempt
to swipe credit card information and carry out malvertising campaigns.
In a new report shared with The Hacker News, cybersecurity firm RiskIQ
said it identified three compromised websites belonging to Endeavor
Business Media last month that are still hosting JavaScript skimming
code — a classic tactic embraced by Magecart, a consortium of
different hacker groups who target online shopping cart systems.
The unpatched affected websites host emergency services-related
content and chat forums catering to firefighters, police officers, and
security professionals, per RiskIQ.
www[.]officer[.]com
www[.]firehouse[.]com
www[.]securityinfowatch[.]com
The cyber firm said it hasn't heard back from Endeavor Business Media
despite reaching out to the company to address the issues.
As a consequence, it's working with Swiss non-profit cybersecurity
firm Abuse.ch to sinkhole the malicious domains associated with the
campaign.
Amazon S3 (short for Simple Storage Service) is a scalable storage
infrastructure that offers a reliable means to save and retrieve any
amount of data via a web services interface.
These virtual credit card skimmers, also known as formjacking attacks,
are typically JavaScript code that Magecart operators stealthily
insert into a compromised website, often on payment pages, designed to
capture customers' card details in real-time and transmit it to a
remote attacker-controlled server.
Last July, RiskIQ uncovered a similar Magecart campaign leveraging
misconfigured S3 buckets to inject digital credit card skimmers on
17,000 domains.
In addition to using JavaScript to load the skimmer, RiskIQ said it
discovered additional code that it calls "jqueryapi1oad" used in
connection with a long-running malvertising operation that began in
April 2019 and has infected 277 unique hosts to date.
"We first identified the jqueryapi1oad malicious redirector — so named
after the cookie we connected with it — in July of 2019," the
researchers said. "Our research team determined that the actors behind
this malicious code were also exploiting misconfigured S3 buckets."
The code sets the jqueryapi1oad cookie with an expiration date based
on the outcome of a bot check and creates a new DOM element in the
page into which it's been injected. Then it proceeds to download
additional JavaScript code that, in turn, loads a cookie associated
with Keitaro traffic distribution system (TDS) to redirect traffic to
scam ads tied to HookAds malvertising campaign.
"The domain futbolred[.]com is a Colombian soccer news site that's in
the top 30,000 of global Alexa rankings. It also misconfigured an S3
bucket, leaving it open to jqueryapi1oad," the researchers said.
To mitigate these threats, RiskIQ recommends securing S3 buckets with
the right level of permissions, in addition to using Access Control
Lists (ACLs) and bucket policies to grant access to other AWS accounts
or to public requests.
"Misconfigured S3 buckets that allow malicious actors to insert their
code into numerous websites is an ongoing issue," RiskIQ concluded.
"In today's threat environment, businesses cannot move forward safely
without having a digital footprint, an inventory of all digital
assets, to ensure they are under the management of your security team
and properly configured."
More information about the BreachExchange
mailing list