Article Details

Scrape Timestamp (UTC): 2024-07-23 10:17:15.525

Source: https://thehackernews.com/2024/07/magento-sites-targeted-with-sneaky.html

Original Article Text

Click to Toggle View

Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files. Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest payment information. The sneaky technique, observed by Sucuri on a Magento e-commerce site's checkout page, allowed the malware to survive multiple cleanup attempts, the company said. The skimmer is designed to capture all the data into the credit card form on the website and exfiltrate the details to an attacker-controlled domain named "amazon-analytic[.]com," which was registered in February 2024. "Note the use of the brand name; this tactic of leveraging popular products and services in domain names is often used by bad actors in an attempt to evade detection," security researcher Matt Morrow said. This is just one of many defense evasion methods employed by the threat actor, which also includes the use of swap files ("bootstrap.php-swapme") to load the malicious code while keeping the original file ("bootstrap.php") intact and free of malware. "When files are edited directly via ssh the server will create a temporary 'swap' version in case the editor crashes, which prevents the entire contents from being lost," Morrow explained. "It became evident that the attackers were leveraging a swap file to keep the malware present on the server and evade normal methods of detection." Although it's currently not clear how the initial access was obtained in this case, it's suspected to have involved the use of SSH or some other terminal session. The disclosure arrives as compromised administrator user accounts on WordPress sites are being used to install a malicious plugin that masquerades as the legitimate Wordfence plugin, but comes with capabilities to create rogue admin users and disable Wordfence while giving a false impression that everything is working as expected. "In order for the malicious plugin to have been placed on the website in the first place, the website would have already had to have been compromised — but this malware could definitely serve as a reinfection vector," security researcher Ben Martin said. "The malicious code only works on pages of WordPress admin interface whose URL contains the word 'Wordfence' in them (Wordfence plugin configuration pages)." Site owners are advised to restrict the use of common protocols like FTP, sFTP, and SSH to trusted IP addresses, as well as ensure that the content management systems and plugins are up-to-date. Users are also recommended to enable two-factor authentication (2FA), use a firewall to block bots, and enforce additional wp-config.php security implementations such as DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS.

Daily Brief Summary

MALWARE // Persistent Credit Card Skimmer Disguised in Magento Swap Files Detected

Threat actors used swap files on compromised Magento e-commerce sites to hide and maintain a credit card skimmer.

The malicious skimmer captured payment information on the website's checkout page and sent the details to a fake domain resembling Amazon.

Sucuri researchers discovered this tactic after noting the skimmer withstood several cleanup efforts due to its stealthy placement in swap files.

Swap files were manipulated to load malicious code while maintaining the appearance of unaltered original files, effectively bypassing standard detection.

It remains unclear how attackers initially accessed the compromised system, but SSH or similar protocols are suspected entry points.

Associated risks highlighted include the ability of such malware to serve as a reinfection vector, using compromised administrator accounts.

Security recommendations include restricting protocol use to trusted IPs, maintaining updated systems and plugins, employing 2FA, and implementing strict firewall rules and additional WordPress configurations.