[BreachExchange] Magecart hits hundreds of websites via ad supply chain hijack

Destry Winant destry at riskbasedsecurity.com
Fri Jan 18 01:32:00 EST 2019


https://www.tripwire.com/state-of-security/featured/magecart-hundreds-websites-supply-chain-hijack/

A criminal Magecart gang successfully compromised hundreds of
e-commerce websites via a malicious script that silently harvested
personal data and payment card information as customers bought goods
and services online.

Rather than specifically target individual websites, the hackers
audaciously hacked a third-party Javascript library from French
advertising network Adverline, allowing the malicious skimming code to
run on at least 277 websites.

According to researchers at Trend Micro and Risk IQ, websites affected
by the breach at Adverline included ticketing, travel and flight
booking services as well as online stores selling cosmetic, healthcare
and apparel products.

The fundamental problem is this – just about every website uses
third-party Javascript used by other people. It’s an easy way to add
functionality to a site with no coding required. A very common example
is Google Analytics, used by many millions of websites to provide
webmasters with a way of collecting web traffic statistics.

But Javascript is very powerful. It can do things inside your browser
that may make you uncomfortable, such as modifying, reading and
exfiltrating any information displayed or entered onto a webpage.

Your company may have security in place to prevent hackers from
successfully breaking into your systems. But with a Magecart-style
attack, they haven’t directly compromised your IT infrastructure.
Instead, they have poisoned a third-party script used by your website.
It’s equivalent to poisoning a water supply upstream from where it’s
being drunk.

Furthermore, the exploitation of the Adverline ad network underlines a
tactic often seen in Magecart attacks. Criminals will take advantage
of the fact that a typical website’s security team is more likely to
be fully-staffed during the working week and left less well-defended
at other times. Often exploitation appears to take place at weekends
or — in this case — between January 1st and January 5th, 2019 when
many IT workers would be expected to be on vacation or still nursing
their New Year’s hangover.

In recent months, there have been numerous companies impacted by
Magecart attacks skimming their customers’ payment details. Businesses
hit have included British Airways, Feedify, Umbro, Vision Direct and
Newegg.

Hundreds of millions of customers have had their payment card details
stolen through Magecart attacks. The costs are obviously significant
to the companies involved and the financial institutions required to
issue new payment cards to customers who have had their details
stolen.

And it’s important to recognize that users will almost always be
oblivious of the technical details of how the attack took place — in
this instance, it proceeded through malicious Javascript supplied by a
third party ad company.

In the eyes of the typical customer, it is the online store selling
perfume or plane tickets that has been careless with their payment
card details.

And as a result, it is those companies whose brand is damaged. It
takes years to build a brand that your customers trust. Trust takes
years to build, seconds to lose and a lifetime to regain – if you’re
lucky.


More information about the BreachExchange mailing list