Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Magecart Hackers Hit Claire’s, Intersport

The website of international retail chain Claire’s was compromised by Macegart hackers for weeks amid an increase in overall online shopping due to the coronavirus pandemic, Sansec reports.

The website of international retail chain Claire’s was compromised by Macegart hackers for weeks amid an increase in overall online shopping due to the coronavirus pandemic, Sansec reports.

The attack appears to have been set up on March 21, the day after Claire’s closed its 3,000 brick-and-mortar stores due to restrictions imposed worldwide as the number of new COVID-19 cases started spiking.

On that day, Netherlands-based eCommerce security company Sansec explains, the attackers registered the domain claires-assets.com, in preparation for the planned malicious activity.

The hackers injected malicious code not only into the fashion retailer’s website, but also the online store of its sister brand Icing. The affected online stores are hosted on the eCommerce platform Salesforce Commerce Cloud, previously known as Demandware.

The injected code was designed to intercept the information customers entered during checkout, and send the data to the claires-assets.com server.

Added to the app.min.js file, which was hosted on the store servers, meaning that the attackers gained write access to the server, the web skimmer remained active until June 13. The code was attached to the submit button of the checkout form.

The skimmer was designed to grab the entire checkout form, encode it, and exfiltrate the data posing as an image file, supposedly in an attempt to avoid detection.

While it’s uncertain how the attackers managed to compromise the online stores in the first place, it’s clear that they anticipated a surge in online traffic following the lockdown. Moreover, Sansec believes that the hackers might have spent 4 weeks trying to gain access to the websites.

Advertisement. Scroll to continue reading.

After discovering the compromise, Sansec notified Claire’s, which confirmed that the web skimmer code was injected into their eCommerce platform to steal customer payment card data. The malicious code was removed and both payment card networks and law enforcement were notified.

At the end of April, Magecart hackers also managed to compromise several online stores of sportswear retailer Intersport. According to ESET, which identified the intrusion, the company’s sites in Croatia, Serbia, Slovenia, Montenegro, and Bosnia and Herzegovina were compromised.

Replying to ESET, Sensec revealed that Intersport was initially compromised on April 30, that it cleared the infection on May 3, but got hacked again on May 14. This, the company points out, is a recurring issue, with around 20% of merchants being re-infected after a breach, typically within 2 weeks.

“The most noteworthy here is that the Intersport site got breached, remained breached for a few days, recovered and then got breached again,” Martin Jartelius, CSO at Outpost24, said in an emailed comment.

“This is a behavior we have also observed during some Red Team engagements, where monitoring and operations may be in place to recover from unexpected events, but there is a hiccup in the process and security is not brought in. In some cases operators have been able to reuse the same system for repeated entry into organizations. This is a case of working detection but broken recovery, and at best, we as a community can gain from this if others look at this and learn. If there is an unexpected change, and you recover from it – ensure to find out why the unexpected change occurred,” Jartelius continued.

Related: Magecart Hackers Continue Improving Skimmers

Related: Magecart Attack on eCommerce Platform Hits Thousands of Online Shops

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.