Multiple retailers hit by new North Korea cyberattack

The websites of multiple retailers in the US and Europe have been compromised by the Magecart credit card skimmer following a series of cyberattacks which are believed to have been launched by the North Korean state-sponsored advanced persistent threat (APT) group Lazarus.

Up until now, North Korean hacking activity was limited to banks and South Korean cryptocurrency markets and the country's covert cyber operations have earned hackers $2bn, according to a report released last year by the UN.

As reported by Computer Weekly, Sansec researcher Willem de Groot first discovered the new campaign that has been operating for over 12 months.

De Groot believes the campaign is financially motivated as obtaining hard currency can be difficult for North Korea and its government. The stolen payment card details acquired from Magecart can be sold from between $5 and $30 on dark web forums which means that the operation has likely been quite lucrative for the Lazarus group.

Global skimming campaign

According to a blog post from Sansec, the Lazarus group used the sites of an Italian modeling agency and a vintage music store in Tehran to run its global skimming campaign.

In order to monetize its skimming operations, the group developed a global exfiltration network that utilizes compromised  websites as a disguise for its criminal activity. The network is also used to funnel the stolen assets so that they can be sold on dark web markets.

Sansec research connected the dots to lead back to the Lazarus group after it identified multiple, independent links between recent skimming activity and previously documented North Korean hacking operations. The firm believes that the group used spear phishing attacks to obtain staff passwords to online retail sites. Once inside, the hackers injected the malicious Magecart script into these store's checkout pages where the skimmer was able to collect customer's payment data.

It was first discovered that hackers had infiltrated these sites back in June of last year and Sansec has been tracking the campaign ever since through unique identifying characteristics and distinctive patterns in the skimmer's code.

Via Computer Weekly



from TechRadar - All the latest technology news https://ift.tt/2O0Dpmn
Share:

Related Posts:

No comments:

Post a Comment

Categories

Rove Reviews Youtube Channel

  1. Subscribe to our youtube channel
  2. Like our videos and share them too.
  3. Our youtube channel name Rove reviews.

WITNUX

This website is made by Witnux LLC. This website provides you with all the news feeds related to technology from large tech media industries like GSM Arena, NDTV, Gadgets 360, Firstpost and many other such ates altogether at technical depicts so that you need not go to several sites to view their post provide you advantantage of time.

From the developer
Tanzeel Sarwar

OUR OTHER NETWORKS

OUR YOUTUBE CHANNEL

ROVE REVIEWS PLEASE SUBSCRIBE

OUR FACEBOOK PAGE

The Rove Reviews

Support

Trying our best to provide you the best DONATE or SUPPORTour site Contact me with details how are you gonna help us