Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Hackers Inject Skimmer Into Boom! Mobile’s Website

Hackers associated with the “Fullz House” group have compromised the website of Boom! Mobile and planted a web skimmer, Malwarebytes reports.

Hackers associated with the “Fullz House” group have compromised the website of Boom! Mobile and planted a web skimmer, Malwarebytes reports.

The victim, an Oklahoma-based wireless services provider, claims to deliver great customer service and transparency to its users, all without contract. The mobile phone plans it sells work on other big networks in the country.

Initially detailed in November 2019, Fullz House has been active for over a year, focused either on phishing for personally identifiable information, banking credentials, and banking card data, or on skimming or phishing card data from ecommerce sites.

The two parts forming this group’s activity are split, but security researchers did observe in the past overlaps in infrastructure (including overlaps between the infrastructure used for sales operations and that employed for stealing data).

The attack on Boom! Mobile, Malwarebytes reveals, involved the injection of one line of code containing a Base64 encoded URL designed to load a JavaScript library from a remote domain used in a previous attack.

The injected URL, Malwarebytes’ security researchers say, loads a fake Google Analytics script which is nothing more than a credit card skimmer designed to find specific input fields and exfiltrate data from those fields.

“This skimmer is quite noisy as it will exfiltrate data every time it detects a change in the fields displayed on the current page. From a network traffic point of view, you can see each leak as a single GET request where the data is Base64 encoded,” the researchers explain.

Malwarebytes also explains that the attackers have registered a large number of new domains in late September, a pattern that the group has followed before. The group has been active over the summer as well.

Advertisement. Scroll to continue reading.

Boom! Mobile’s website is running PHP version 5.6.40 (which reached end of support in January last year) and this, or a vulnerable plugin, might have been the point of entry, Malwarebytes notes.

The security firm also says that it reported the incident to the wireless services provider both via live chat and email, but hasn’t heard back and the compromise hasn’t been addressed yet, meaning that Boom! Mobile customers continue to be at risk.

“While Magecart attacks typically target e-commerce retailers, any business collecting credit card numbers and other personal information online is vulnerable. Shadow Code vulnerabilities lurk in third-party and open source libraries commonly used in web applications. Businesses must ensure they have continuous visibility into client-side scripts on their websites in order to detect and stop such digital skimming attacks,” Ameet Naik, security evangelist at PerimeterX, said in an emailed comment.

Related: Magecart Group Hits 570 Websites in Three Years

Related: Hunting for Magecart With URLscan.io

Related: Magecart Attacks on Claire’s and Other U.S. Stores Linked to North Korea

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.