Security researchers at RiskIQ in France recently reported a new group as part of the Magecart collective which recently targeted French advertising agency Adverline. The new group, known as Magecart Group 12, conducted their attack by injecting malicious code into a JavaScript library that controls retargeting advertising. The malicious code, similar to previous Magecart attacks, contains a web-based skimmer which steals credit card information. As a result of the attack, Trend Micro identified over 270 e-commerce sites with the skimmer installed, across a range of commerce lines. Some affected sites included those used for travel, cosmetics, healthcare, and apparel. As noted by security researchers, the skimmer code prevents deobfuscation and analysis by conducting frequent internal integrity checks.
We assess that given the ongoing success of Magecart attacks, they will continue in the immediate to long term. Additionally, with a new threat group joining the Magecart collective, we assess it likely that there will be both an increase in attacks as well as significant developments and innovations to the coding used to conduct them. We advise clients who have conducted any e-commerce activities with companies based in France to monitor their credit card bills for abnormal activity. Additionally, given Magecart's willingness to attack high-profile targets such as attacks on Ticketmaster, British Airways, and Newegg last year, any clients involved in e-commerce are advised to ensure all cyber-security measures have the most recent security patches and updates installed, and that cyber-security best practices are being used to secure commerce networks.
Last week, an independent security researcher was able to locate a database that contained around 24 million documents liked to loans and mortgages from several financial institutions in the United States that dated back to 2008. Some of the records contained sensitive and personal data such as name, birth date, social security number, address, bank account number, W-2 tax forms, among others. Due to the amount of found information, researchers found it difficult to trace back the holder of information; however, later it was found that the documents were in possession of Ascension – a company in Texas that provides analytic and data services. The documents were taken down by January 15, but they have been exposed for at least two weeks. At present, there is no certainty of how many persons were affected by this breach, but a partner company of Ascension stated that affected clients would be notified.
Although the systems of Ascension reportedly were not compromised, because of the sensitive nature of the exposed information, we assess that the data breach poses a significant threat to affected clients. At present, researchers were able to corroborate that there were documents from institutions like Wells Fargo, Capital One, Citigroup, and the Department of Housing and Urban Development. We find it likely that other affected companies might emerge as the investigations continue. We recommend potentially affected clients to follow on the results of the investigation and to be aware of a possible communication regarding the data breach. Currently, the company has not given information on where concerned people could ask for further details. Therefore, we advise all potentially impacted clients to exercise caution and closely monitor credit statements and tax claims in the mid to long term for any abnormal movements.