This latest campaign involves a PHP-based web shell disguised as a favicon (“Magento.png”), with the malware inserted into compromised sites by replacing the legitimate shortcut icon tags with a path to the fake PNG file. This web shell then retrieves the next-stage payload (a credit card skimmer) from an external host. The credit card skimmer used in this campaign is similar to another version dubbed ‘Cardbleed’ used in an attack in September 2020.
Malwarebytes linked this latest campaign to Magecart Group 12 based on methods, techniques, and procedures observed in the attacks. The researchers also noticed that the domain name (zolo[.]pw) involved in the campaign is “hosted on the same IP address (217.12.204[.]185) as recaptcha-in[.]pw and google-statik[.]pw, domains previously associated with Magecart Group 12.”
“In comparison, the skimmer we showed in this blog dynamically injects code into the merchant site. The request to the malicious domain hosting the skimming code is not made client-side but server-side instead. As such a database blocking approach would not work here unless all compromised stores were blacklisted, which is a catch-22 situation. A more effective, but also more complex and prone to false positives approach, is to inspect the DOM in real time and detect when malicious code has been loaded.”