Rewterz Threat Alert – ProLock Ransomware Exfiltrates Data and Encrypts Files
September 2, 2020Rewterz Threat Advisory – CVE-2020-4637 – IBM Resilient SOAR information disclosure
September 2, 2020Rewterz Threat Alert – ProLock Ransomware Exfiltrates Data and Encrypts Files
September 2, 2020Rewterz Threat Advisory – CVE-2020-4637 – IBM Resilient SOAR information disclosure
September 2, 2020Severity
Medium
Analysis Summary
Researchers have published their analysis of a web skimmer that uses the Telegram API for exfiltration. As with other skimmers, the attack begins when a commerce site is compromised via a vulnerability in their software. Once access is gained, malicious JavaScript code is injected into the website and will be executed on checkout pages. When a user enters data into that checkout page, it’ll be harvested and encrypted. It is then sent in a POST request to a hardcoded Telegram bot and channel via the Telegram API. The code also passes the entered data to the legitimate payment processor in order to complete the transaction so that the malicious activity is more likely to go unnoticed. While the Telegram API has been used by other malware authors to exfiltrate data, this is the first case in which is has been observed as part of a web skimmer.
Impact
Data exfiltration
Remediation
- Keep applications and operating systems running at the current released patch level.
- Ensure anti-virus software and associated files are up to date.