21 December 2020

Magecart hackers accidentally exposed list of compromised victims


Magecart hackers accidentally exposed list of compromised victims

A web skimming group inadvertently leaked a list of 41 previously hacked online stores. The list was found by Sansec researchers while examining a dropper used to deploy a stealthy Remote Access Trojan designed to provide a long-term access to eCommerce sites to steal customers’ personal and financial information.

The RAT was delivered as a 64bit ELF executable that hides in the server’s process and masquerades as the DNS or SSH server daemon as to not raise suspicions. According to the researchers, the malware stays in sleep mode almost all day, waking up only once in the morning at 7am when it attempts to connect to its command and control server to request instructions.

“The dropper is designed to parse many different Magento deployment setups. Second, the PHP code seems to be written by someone unfamiliar with PHP. It uses shared memory blocks, which is rarely used in PHP but is much more common in C programs,” the researchers said.

Sansec has found several similar RATs on different systems compiled on different Red Hat and Ubuntu Linux systems suggesting involvement of multiple people in this campaign, or that cybercriminals possibly obtained the RAT source code from public sources or bought it on dark web markets.

The researchers said they reached out to owners of compromised online stores to inform them their servers were hijacked.

Back to the list

Latest Posts

Cyber Security Week in Review: April 26, 2024

Cyber Security Week in Review: April 26, 2024

In brief: Cisco and CrushFTP patch zero-days, researchers sinkhole C&C server used by PlugX malware, and more.
26 April 2024
US charges Samourai cryptomixer founders with laundering $100 million

US charges Samourai cryptomixer founders with laundering $100 million

The cryptocurrency mixer facilitated over $2 billion in illegal transactions.
25 April 2024
ArcaneDoor state-sponsored malware campaign strikes Cisco networking gear

ArcaneDoor state-sponsored malware campaign strikes Cisco networking gear

The attackers exploited two zero-day vulnerabilities in Cisco networking equipment.
25 April 2024