10001701295?profile=RESIZE_400xA supply-chain campaign infecting Sotheby’s real-estate websites with data-stealing skimmers was recently observed being distributed via a Brightcove cloud-video platform instance:  https://www.brightcove.com   According to Palo Alto Networks’ Unit 42 division, researchers noticed that most of the activity affected real-estate-related sites.  At least 100 of them were successfully infected.

A full list of affected websites can be found here:
https://github.com/pan-unit42/iocs/blob/master/Skimmer_IOC.txt).

Upon closer inspection, all of the compromised sites belonged to one parent company (Sotheby’s), which imported the same video player, infested with malicious scripts, from Brightcove.

In skimmer attacks, cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site’s HTML form page to collect sensitive user information,” researchers explained in a Monday posting. “In the case of the attacks described here, the attacker injected the skimmer JavaScript codes into video, so whenever others import the video, their websites get embedded with skimmer codes as well.[1]

According to Brightcove, the malicious video in question was housed in third-party storage, and Brightcove’s own systems were not compromised.  “A Brightcove customer experienced a security issue that originated with videos stored by the customer on a third-party solution, and at no point were other customers, or their end-users, at risk due to this incident,” the company representative reported.  “Brightcove operates a highly secure video platform and offers a number of solutions to ensure a secure video experience for our customers.  If our customers or partners experience security threats to their systems that would impact their use of our services, we work closely with them to remedy any vulnerabilities as quickly as possible and offer support from our team of experts.”

An analysis of the skimmer code showed that it harvests information that victims load into contact pages requesting a home showing, including names, emails, and phone numbers.  It then sends them to a malicious collection server (https://cdn-imgcloud[.]com/img), hosted on a content delivery network.  The information could be used for convincing follow-on phishing and other social-engineering attacks.

“The skimmer itself is highly polymorphic, elusive, and continuously evolving,” researchers warned.  “When combined with cloud distribution platforms, the impact of a skimmer of this type could be very large.  For these reasons, attacks like this raise the stakes for security researchers to untangle their sophisticated strategies and trace them to the root cause.  We have to invent more sophisticated strategies to detect skimmer campaigns of this type since merely blocking domain names or URLs used by skimmers is ineffective.”  Abusing a video instance is not difficult, researchers noted.  After signing up to use the video creator, any user can add JavaScript customizations by uploading a JavaScript file to be included in the player.

“In this specific instance, the user uploaded a script that could be modified upstream to include malicious content,” according to Unit 42.  “We infer that the attacker altered the static script at its hosted location by attaching skimmer code.  Upon the next player update, the video platform re-ingested the compromised file and served it along with the impacted player.”

To protect their websites, website administrators can take steps such as conducting web content integrity checks on a regular basis, to detect and prevent the injection of malicious code into the website content, researchers said.  “As these types of attacks continue to evolve in sophistication and cleverness, enterprises need to remain focused on the basics,” the product manager at Comfort AG, said via email.  “Develop a defensive strategy incorporating more than just perimeter-based security, don’t assume that cloud-based services are inherently safe without proper due diligence, and put a priority on emerging data-centric security methods such as tokenization and format-preserving encryption, which can apply protections directly to the sensitive data that threat actors are after.”

AG added, “Tokenizing data as soon as it enters your enterprise workflows means that business applications and users can continue to work with that information in a protected state, but more importantly if the wrong people get ahold of it, either inadvertently or through coordinated attacks like this one, the sensitive information remains obfuscated so that threat actors cannot leverage it for gain.”

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  For questions, comments, or assistance, please contact the office directly at 1-844-492-7225, or feedback@wapacklabs.com     

Weekly Cyber Intelligence Briefings:

Weekly Cyber Intelligence Briefings:

REDSHORTS - Weekly Cyber Intelligence Briefings

https://attendee.gotowebinar.com/register/3702558539639477516

 

[1] https://threatpost.com/data-skimmer-sothebys-real-estate-websites/177347/

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!

Join Red Sky Alliance