Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Pierluigi Paganini September 20, 2018

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg.

The Magecart cybercrime group is back, this time the hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg.

Magecart  is active since at least 2015, recently the group hacked the websites of TicketmasterBritish Airways, and Feedify to inject a skimmer script used to siphon users’ payment card data.

The security firms Volexity and RiskIQ have conducted a joint investigation on the hack.

Volexity was able to verify the presence of malicious JavaScript code limited to a page on presented during the checkout process at Newegg. The malicious code specifically appeared once when moving to the Billing Information page while checking out.reported Volexity.

“This page, located at the URL, would collect form data, siphoning it back to the attackers over SSL/TLS via the domain”

Now Magecart group managed to compromise the Newegg website and steal the credit card details of all customers who made purchases between August 14 and September 18, 2018.

“On August 13th Magecart operators registered a domain called with the intent of blending in with Newegg’s primary domain,  Registered through Namecheap, the malicious domain initially pointed to a standard parking host.” reads the analysis published by RiskIQ.

“However, the actors changed it to a day later, a Magecart drop server where their skimmer backend runs to receive skimmed credit card information. Similar to the British Airways attack, these actors acquired a certificate issued for the domain by Comodo to lend an air of legitimacy to their page”

NewEgg timeline

Active since at least 2015, the Magecart hacking group registered a domain called neweggstats(dot)com (similar to Newegg’s legitimate domain on August 13 and acquired an SSL certificate issued for the domain by Comodo.

The technique is exactly the one employed for the attack against the British Airways website.

On August 14, the group injected the skimmer code into the payment processing page of the official  retailer website, so when customers made payment the attackers were able to access their payment data and send them to the domain neweggstats(dot)com  they have set up.

newegg skimmer

“The skimmer code is recognizable from the British Airways incident, with the same basecode. All the attackers changed is the name of the form it needs to serialize to obtain payment information and the server to send it to, this time themed with Newegg instead of British Airways.” continues RiskIQ.

“In the case of Newegg, the skimmer was smaller because it only had to serialize one form and therefore condensed down to a tidy 15 lines of script”

Experts noticed that the users of both desktop and mobile applications were affected by the hack.

Customers that made purchases on the Newegg website between August 14 and September 18, 2018, should immediately block their payment card.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – skimmer sript, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

you might also like

leave a comment