Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
A recent blog post by Jacob Pimental and Max Kersten highlighted Magecart activity targeting ticket re-selling websites for the 2020 Olympics and EUFA Euro 2020, olympictickets2020.com and eurotickets2020.com respectively. These sites were compromised by a skimmer using the domain opendoorcdn.com for data exfiltration. With RiskIQ data, our researchers built on the previous reporting to identify more skimming domains used by the attackers, as well as additional compromised sites. RiskIQ can also now attribute all these compromises to Magecart Group 12.
The obfuscation and skimming code we observed on opendoorcdn.com matches that used by Magecart Group 12, whose skimmer and obfuscation techniques we analyzed in our blog posts, “New Year, Same Magecart: The Continuation of Web-based Supply Chain Attacks” and “Magento Attack: All Payment Platforms are Targets for Magecart Attacks.” However, there are differences in the techniques employed by Group 12 in these more recent compromises, which we’ll break down here.
In those blog posts, we noted that Group 12 employed base64 encoded checks against the URL looking for the word “checkout” to identify the proper page on which to load their skimmer code. This encoding masked both the check itself and the skimmer URL. Quoting from our May 1st, 2019 report:
Magecart Group 12’s script tag from RiskIQ’s May report
The Magecart skimmer
The variable loading the skimmer
On February 3rd, Pimental and Kersten published their followup blog detailing their efforts to identify further opendoorcdn.com victims and have the skimming domain taken down by the Chinese company through which it was registered. On February 2nd, RiskIQ observed that opendoorcdn.com was replaced on at least two of the victim sites named in the blog by a live skimmer domain, toplevelstatic.com:
The new skimmer domain
New skimmer domain
RiskIQ has observed the toplevelstatic.com domain on three victim sites so far, all of which were previously compromised by opendoorcdn.com, as seen through our host pairs data set in RiskIQ Community:
Victims of original skimmer domain
Victims of new skimmer domain
The domain toplevelstatic.com was registered on February 1st, 2020, through Chinese registrar Guangzhou Shidaihulian (now.cn) and uses the same DNS provider as opendoorcdn.com, DNSPod (also based in China). Both domains are hosted on NGINX servers and use Let’s Encrypt certs. The IPs connected to toplevelstatic.com have changed at least once a day and sometimes more often, with each server, so far, based in Russia.
Resolutions for toplevelstatic.com
Hosting for opendoorcdn.com followed a more leisurely pace of flux. From January 2019 through January 2020, it sometimes used the same IP for weeks at a time and utilized servers based all over the world.
Resolutions for opendoorcdn.com
RiskIQ’s detection logic allowed us to identify additional domains hosting this particular skimmer. Two popular emergency preparedness sites, beprepared.com and augasonfarms.com, were affected by one of these additional skimmer domains.
One of the new victims with an Alexa ranking of 105,288
Both sites are owned by Blue Chip Group Manufacturing and appear to be similarly constructed. We observed augasonfarms.com loading skimming code from storefrontcdn.com on January 27th. The beprepared.com site seems to have been loading the skimming code from January 16th through 29th. In these instances, the skimmer was added through a simple script tag.
Host pairs showing sites loading storefrontcdn.com
Magecart script on beprepared.com
It appears the injections have been removed from sites, and they are currently free of skimming code. Additional IOCs can be viewed in our Magecart Group 12 project here: https://community.riskiq.com/projects/b959cb28-d99c-b27b-bfd8-ae15d60a7e1b
Following the publication of this article, we noticed further detections showing that beprepared.com was also loading skimming code from wappallyzer.com, another Group 12 domain. Our data shows that this began on January 24th. We have communicated this to the affected company and are working with them to remediate.
Tomorrow: RiskIQ's @joshuamayfield sits down with @forrester's @josh_zelonis to discuss what goes into a next-gen vulnerability management program, and why discovering unknowns is where it all starts: https://t.co/kCxgPVJ1sD
What are the keys to a Modern Vulnerability Risk Management Program? On Tuesday, @joshuamayfield and @josh_zelonis will examine why defending your organization's digital attack surface starts with being able to discover unknowns and investigate threats: https://t.co/kCxgPW0Ckb
IGNITE is just 10 days away! RSVP now to kick off #RSAC and party with Flashpoint, @elastic, @ThreatQuotient, @Siemplify, and @RiskIQ: https://t.co/hnlh0UhHEo
The largest UK #GDPR fine was £183m in 2018 as B.A. booking website was hit by Magecart ccard skimming code. @RiskIQ worked with https://t.co/E3JRdvCMWA and Shadowserver to take down the malicious domains. https://t.co/iiH69vbKFK