Article Details

Original Article Text

Click to Toggle View

Hackers modify online stores’ 404 pages to steal credit cards. A new Magecart card skimming campaign hijacks the 404 error pages of online retailer's websites, hiding malicious code to steal customers' credit card information. This technique is one of the three variants observed by researchers of the Akamai Security Intelligence Group, with the other two concealing the code in the HTML image tag's 'onerror' attribute and an image binary to make it appear as the Meta Pixel code snippet. Akamai says the campaign focuses on Magento and WooCommerce sites, with some victims linked to renowned organizations in the food and retail sectors. Manipulating 404 pages All websites feature 404 error pages that are displayed to visitors when accessing a webpage that does not exist, has been moved, or has a dead/broken link. The Magecart actors leverage the default '404 Not Found' page to hide and load the malicious card-stealing code, which hasn't been seen before in previous campaigns. "This concealment technique is highly innovative and something we haven't seen in previous Magecart campaigns," reads Akamai's report. "The idea of manipulating the default 404 error page of a targeted website can offer Magecart actors various creative options for improved hiding and evasion." The skimmer loader either disguises itself as a Meta Pixel code snippet or hides within random inline scripts already present on the compromised checkout web page. The loader initiates a fetch request to a relative path named 'icons,' but as this path does not exist on the website, the request results in a "404 Not Found" error. Akamai's investigators initially assumed the skimmer was no longer active or the Magecart group had made a configuration mistake. However, upon closer inspection, they found that the loader contained a regular expression match searching for a specific string in the returned HTML of the 404 page. Upon locating the string on the page, Akamai found a concatenated base64-encoded string concealed in a comment. Decoding that string revealed the JavaScript skimmer, which hides in all 404 pages. "We simulated additional requests to nonexistent paths, and all of them returned the same 404 error page containing the comment with the encoded malicious code," explains Akamai "These checks confirm that the attacker successfully altered the default error page for the entire website and concealed the malicious code within it!" Because the request is made to a first-party path, most security tools monitoring suspicious network requests on the checkout page would overlook it. Stealing the data The skimmer code displays a fake form that the website visitors are expected to fill out with sensitive details, including their credit card number, expiration date, and security code. Once this data is entered on the bogus form, the victim gets a fake "session timeout" error. In the background, all information is base64-encoded and sent to the attacker via an image request URL carrying the string as a query parameter. This approach helps evade detection by network traffic monitoring tools, as the request looks like a benign image fetch event. However, decoding the base64 string reveals personal and credit card information. The case of manipulating 404 pages highlights the evolving tactics and versatility of Magecart actors, who continually make it harder for webmaster to locate their malicious code on compromised websites and sanitize them.

Daily Brief Summary

CYBERCRIME // Hackers Use Online Stores’ 404 Error Pages to Steal Credit Card Information

A new Magecart card skimming campaign is hijacking online retailers' 404 error pages to hide malicious code designed to steal customer credit card information.

This campaign targets Magento and WooCommerce-hosted sites, with some victims linked to prominent organizations in the food and retail sectors.

The '404 Not Found' error page is exploited to conceal and load the code, presenting an innovative concealment technique that hasn't been seen in previous Magecart campaigns.

The skimmer loader is either disguised as a Meta Pixel code snippet or hidden within random inline scripts and starts fetching requests to a nonexistent path named 'icons', resulting in a '404 Not Found' error, thus bypassing detection from most security tools.

The skimmer code presents a fake form, where visitors are expected to input sensitive information like credit card details, which is then sent to the attackers, giving an impression of a benign image fetch event, thereby evading network traffic monitoring tools.

This use of 404 pages underlines the constantly evolving techniques of Magecart actors, making it increasingly difficult for webmasters to locate and remove their malicious code from compromised websites.