Security researchers were able to link one of the hacking groups operating under the Magecart umbrella to the infamous threat actor known as the Cobalt Group.
There are numerous groups operating under the Magecart umbrella, with their infrastructure flooding the Internet, RiskIQ, which has identified dozens of known groups and over 570 command and control (C&C) domains, explains in a new report.
Some of these groups, however, appear tied to more prominent threat actors, a joint report from security researchers at Malwarebytes and HYAS Threat Intelligence reveals.
While Magecart Group 6 was previously linked to the FIN6 hackers, Malwarebytes and HYAS now reveal they have found ties between Group 4 and the Cobalt Gang, including matching patterns in the email addresses used to register domains.
Furthermore, the researchers explain that Group 4 has been conducting both client-side and server-side skimming, which sets it apart from most Magecart groups, which only cover the former.
One of Group 4’s client-side skimmers was hidden in the jquery.mask.js plugin and was appended at the end of the script. The skimmer also had some layers of obfuscation.
In both cases, the domains were registered to robertbalbarran(at)protonmail.com and were previously identified by RiskIQ.
Looking at their exfiltration gates, however, Malwarebytes and HYAS were able to connect them to other registrant emails and identify a pattern: email addresses have the format [first name][initial][last name].
This is the same technique that the Cobalt Group has switched to, not to mention that the same email services, registrars, and privacy protection services are used in both cases. Furthermore, regardless of the email provider, 10 of the accounts reused two IP addresses, even months apart.
One email address, petersmelanie(at)protonmail.com, was used to register 23 domains, including a site used in a phishing campaign leveraging CVE-2017-0199 and another one targeting Oracle users.
“Based on their historical ties to the space, and the entrance of sophisticated actor groups such as FIN6 and others, it’s logical to conclude that Cobalt Group would also enter this field and continue to diversify their criminal efforts against global financial institutions,” Malwarebytes notes.
RiskIQ reports a total of 2,086,529 observations of Magecart to date. This rapidly growing cybercrime syndicate comprised of dozens of subgroups is employing a variety of techniques to carry out attacks, including supply-chain attacks, and the targeting of misconfigured Amazon S3 buckets and Magento sites.
Businesses need an average of 22 days to discover and remediate a Magecart compromise, and some breaches last years due to the lack of visibility organizations have into their web-facing resources.
Related: Magecart Hackers Target L7 Routers