• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – SharpPanda Chinese APT Group Targets Southeast Asian Government – Active IOCs
January 25, 2022
Rewterz Threat Advisory – Multiple Node.js Vulnerabilities
January 26, 2022

Rewterz Threat Alert – Water Pamola Attack Campaign Targeting eCommerce Merchants

January 25, 2022

Severity

High

Analysis Summary

At the end of 2021, Japanese eCommerce merchants were victim to a digital skimming campaign through a popular open-source eCommerce solution. Based on TTPs (Tactics, Techniques, and Procedures) and other commonalities, it is likely that the threat actors targeting the Japanese eCommerce merchants – as detailed by JPCERT – are also behind the activity identified by Visa PFD (Payment Fraud Disruption) mentioned below. 

Overview of the Campaign

In the summer of 2021, Japanese eCommerce retail and wholesale merchants were targetted by threat actors using an exploit in the unpatched and outdated version of an eCommerce platform being used by them. The XSS (cross-site scripting) vulnerability in the platform, along with a malicious JavaScript URL, enabled the threat actors to compromise the platform to place orders. 

Once the infected URL and malicious payloads were executed by an employee at the merchants’, it enabled the actors to deploy further malicious payloads (including PHP file uploader scripts, database management tools, JavaScript files, and webshells). The checkout page of the compromised platform was targeted using the JavaScript files through the malicious code. This enabled the actors to harvest payment details, including PAN, cardholder name, expiration date, and CVV2, during the checkout process. The database management tool deployed by the threat actors also enabled them to access the CDE (Cardholder Data Environment). 

Impact

  • Data Theft
  • Credential Loss
  • Session Hijacking
  • Financial Loss

Affected Vendors

  • eCommerce Platforms

Indicators of Compromise

Filename

  • aashiawaseyukkurishitene[.]php / confirm_side_img[.]php / jquery[.]ui[.]theme[.]css[.]php
  • jquery[.]js[.]php
  • css_coluns[.]php
  • footer_c[.]png[.]php
  • head[.]css[.]php
  • omedetougozai[.]php
  • slick[.]min[.]js

MD5

  • 6b6d77764d049c40623f04264fe4d2af
  • 6de6ad1a82854080cb4b58f870521bed
  • 5738bb003ec71eacee6ffd6b9b30b1e3
  • c08b9c87719f212ac36e8b3752d3e8d4
  • a6af5c9c6896c82655c793261c81b72f
  • 031aaceefbf81e7442289d157c144d60
  • 9c860dee0ab82ab438f77c7cceefe42c
  • 35bcf859e286ac157fcbc124df22445c
  • bf190d5f048db576115713f5c97a2f79

SHA-256

  • 94342ffeec81289f3e9e25165ad98df9d8af98c82c5d2d4fffd89869035b163c
  • 30ac05df918603b444d67f868d580bc9f57900d09135c50f700e868a3a22b42c
  • 1e1813745f670c469a1c368c45d159ec55656f0a31ed966065a9ca6edd27acc1
  • 526d8c7235eaeb58ffba398a99a4ab0c92d01a9d1a7585efc3fc053b6e230a7c
  • a619f1ff0c6a5c8fc26871b9c0492ca331a9f84c66fa7479d0069b7e3b22ba31
  • b0127c4986bce415f319c59c766e7fbd447bb04d914d2ae41bb378d5075919fe
  • d91c0e58b8647ca4bbb5bf2e7360353fb2733d683ea817ceb2e32808585bdc6f
  • f5b0a763f9b1e79179db5f44fa3436dd35805fbed49ffb003d72322f9ed454a9
  • 3af5d1b3b54cf755e8404bf6bc25438092365c5c23810c75b1ad4ae9de9aef62

SHA-1

  • d71aa7ee65482a1519ca7bf3358343c27c5e1a18
  • 08afac54c1cde56acba604587de2a689b3f94baf
  • 9b964d574197f3943db0cf87d56c88c1ec1f86e0
  • 40d980c3a9e43cab1fa181004143a2dbc73d2bda
  • 469350dcd3f36ff934be850525d1042163255581
  • ee94ec05a4464755a3ea2017ed138c8f8f4b2a9c
  • bc11034dc9b254b7cb8fb5021ad30d690d254d4a
  • 18eb80befb2db6d79301d10b5d219a055052f706
  • 952887a7ae79ba6a65ece870544f094c7a33745f

Remediation

  • Patch – Patch and upgrade any platforms and software timely.
  • WAF -Set up a Web Application Firewall with rules to block suspicious and malicious requests.
  • Admin Access – limit access to administrative accounts and portals to only relevant personnel and make sure they are
  • not publicly accessible.
  • Passwords – Implement strong passwords. Enable two-factor authentication.
  • Logging – Log your eCommerce environment’s network activity and web server activity.
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.