• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – ProLock Ransomware Exfiltrates Data and Encrypts Files
September 2, 2020
Rewterz Threat Advisory – CVE-2020-4637 – IBM Resilient SOAR information disclosure
September 2, 2020

Rewterz Threat Alert – New Web Skimmer Exfiltrates Data via Telegram

September 2, 2020

Severity

Medium

Analysis Summary

Researchers have published their analysis of a web skimmer that uses the Telegram API for exfiltration. As with other skimmers, the attack begins when a commerce site is compromised via a vulnerability in their software. Once access is gained, malicious JavaScript code is injected into the website and will be executed on checkout pages. When a user enters data into that checkout page, it’ll be harvested and encrypted. It is then sent in a POST request to a hardcoded Telegram bot and channel via the Telegram API. The code also passes the entered data to the legitimate payment processor in order to complete the transaction so that the malicious activity is more likely to go unnoticed. While the Telegram API has been used by other malware authors to exfiltrate data, this is the first case in which is has been observed as part of a web skimmer.

diagram.png

Impact

Data exfiltration

Remediation

  • Keep applications and operating systems running at the current released patch level.
  • Ensure anti-virus software and associated files are up to date.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.