Payment information stolen by a MageCart attack  | xxxPayment information stolen by a MageCart attack  – xxx
菜单

Payment information stolen by a MageCart attack 

八月 7, 2019 - BleepingComputer

Payment information stolen by a MageCart attack 

The web site for the National Baseball Hall of Fame in Cooperstown, NY was hacked to include a malicious MageCart script that stole the payment information of customers who purchased items on the site.

According to a notification filed with California’s security breach notification service, the National Baseball Hall of Fame’s web site had a malicious script injected into their online store between November 15, 2018 and May 14, 2019.

“The National Baseball Hall of Fame (“Hall of Fame”) values and respects the privacy of your information, which is why we are writing to advise you of a recent incident that may have involved some of your personal information,” the notification alerted affected users. “On June 18, 2019, we learned that some of your information could have been obtained by an unauthorized third-party that placed malicious computer code on the Hall of Fame web store (shop.baseballhall.org) e-commerce system. The code may have targeted certain personal information of customers who made a credit card purchase via the web store between November 15, 2018 and May 14, 2019.”

The information that could have been stolen includes a customer’s name, address and credit or debit card information, including the CVV code.

It should be noted that this attack only affected customers who purchased items from the web site and not in the museum itself.

If you purchased anything from the National Baseball Hall of Fame web site located at https://baseballhall.org/, you should report the situation to your credit card company and monitor your statement for fraudulent purchases.

Payment information stolen by a MageCart attack 

Attackers gained access to the Hall of Fame’s web site and injected a malicious script on the site that would monitor for submitted payment information and then forward it to the attackers.

While the script is no longer active on the web site, BleepingComputer was able to locate the code in a snapshot on Archive.org.

As you can see from the image below, the attackers inserted what appears at first glance to be a Google Analytics script. If you look more closely, though, the associated script is being read from www.googletagstorage.com. 

Payment information stolen by a MageCart attack 
Injected Script

While the domain indicates it belongs to Google, www.googletagstorage.com is actually not registered to them and resolves to an IP address located in Lithuania. This same host has also been seen used in other attacks in the past as shown by the IOCs on AlienVault and IBM’s Xforce Exchange.

The script is built to look like a legitimate Google Analytics script, but if you analyze it you can see that it is monitoring the shop’s billing form that has an ID of “co-billing-form”.

Payment information stolen by a MageCart attack 
MageCart Script

While there is no confirmation that this is the same group, the methods used in this attack are similar to the MageCart Group 4 that was previously described in a report by RiskIQ.

Related Articles:

Over 17,000 Domains Infected with Code that Steals Card Data

Automated Magecart Campaign Hits Over 960 Breached Stores

Leapfrog Children’s Tablet Owners Should Remove Pet Chat Now

CafePress Data Breach Exposes Personal Info of 23 Million Users

1M+ Payment Card Details from South Korea Sold on the Dark Web

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51