Cybercriminals Target Magento Websites with Covert Credit Card Collector through Exchange Files

July 23, 2024NewsroomSecurity Threat / Website Protection

Risk actors have been uncovered using exchange files in infiltrated websites to hide an ongoing credit card scraper and capture payment data.

Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

July 23, 2024NewsroomSecurity Threat / Website Protection

Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

Risk actors have been uncovered using exchange files in infiltrated websites to hide an ongoing credit card scraper and capture payment data.

The devious method, witnessed by Sucuri on a Magento e-commerce website’s purchase page, enabled the malicious software to persist through several cleanup efforts, according to the organization.

The scraper is created to gather all data entered into the credit card form on the site and send the details to a domain controlled by the attacker named “amazon-analytic[.]com,” which was established in February 2024.

“Observe the utilization of the brand name; this strategy of leveraging trendy products and services in domain titles is regularly used by malicious individuals in an effort to avoid detection,” cybersecurity analyst Matt Morrow stated.

Cybersecurity

This is solely one of numerous methods used by the threat actor to elude defenses, including the employment of exchange files (“bootstrap.php-swapme”) to inject the malicious code while preserving the original file (“bootstrap.php”) uninfected and clean.

“Whenever files are modified directly via SSH the server generates a temporary ‘exchange’ version as a precaution in case the editor crashes, which prevents the loss of the entire content,” Morrow elaborated.

“It became clear that the attackers were leveraging an exchange file to retain the malware on the server and avoid standard detection methods.”

Although the initial access method in this scenario remains uncertain at present, it is believed to have involved SSH or some different terminal session.

The exposure happens as compromised administrator user accounts on WordPress sites are being utilized to deploy a deceitful plugin that pretends to be the authentic Wordfence plugin, but possesses the ability to generate unauthorized admin users and deactivate Wordfence while giving the impression that everything is functioning correctly.

“For the harmful plugin to have been positioned on the site initially, the site would have already been compromised — this malware could absolutely function as a reinfection avenue,” cybersecurity analyst Ben Martin remarked.

“The harmful code exclusively functions on WordPress admin interface pages containing the term ‘Wordfence’ in their URLs (Wordfence plugin configuration pages).”

Website owners are advised to restrict the usage of common protocols such as FTP, sFTP, and SSH solely to trusted IP addresses, as well as guaranteeing that the content management systems and plugins are up-to-date.

Users are also encouraged to implement two-factor authentication (2FA), deploy a firewall to block bots, and enforce additional wp-config.php safety configurations like DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS.

Found this report intriguing? Keep track of us on Twitter and LinkedIn for more exclusive articles we publish.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.