back to article Crims cram credit card details into product shots on e-shops

Hackers are going to considerable lengths to hide credit cards stolen from websites victimised in a wave of recent attacks, weaving the data into working images of products sold online. The tricks are part of a wave of attacks targeting some 6000 Magento e-commerce sites The Register reported last week. Sucuri remediation …

  1. Mark 85

    Why? Is this somehow more secure than keeping the data on their own PC? Or is it a way of selling the numbers? Just seems like a lot of trouble to first get the numbers and then hack the selling server.

    1. Notas Badoff
      Pirate

      Exfiltration by another means - http GET

      So they manage to drop nasty bits o'code into your sausage grinding server, and wait to pluck out the juicy bits as the handle cranks the credit cards through. Their code caches the tasty morsels in a place they can reach any time they want, just by accessing the sales catalog. They *don't* have to re-access the server via the original networking backdoor (and which might leave tracks to trace back) since they've probably closed up the original vulnerability anyway cuz competition from other baddies.

      A single access to break in, drop code and clean up tracks. Then they re-sample at will retrieving the latest data using plain and anonymous public web access. I am in awe. I'm off to go hide under the covers and wait for the cold sweats...

      1. John Mangan

        Re: Exfiltration by another means - http GET

        "I am in awe"

        Yeah. Thieving scum, obviously. But clever with it.

    2. frank ly

      It would be a lot safer that keeping the numbers on your own PC. It does seem to be a simple and safe way to provide a CC number to a buyer.

      1. allthecoolshortnamesweretaken

        I'd say that's the whole point of the exercise. A simple and safe way to get credit card numbers (or other information) to a buyer who's maybe not that tech-savy, and in an indirect way too.

        Hiding in plain sight is one of the best tricks to use.

    3. Anonymous Coward
      Anonymous Coward

      Data exfiltration can be challenging - including to stay undetected. This is a potential way around the need to revisit the server or to use encryption, ftp, etc.

  2. Ole Juul

    am I missing something?

    $ echo "here is some text" >> picture.jpg works just fine. Doesn't show in the image which looks just the same as it did before. You can read it clearly in the code by doing $ cat picture.jpg. Try it. This isn't exactly what I'd call hacking.

    1. BarryUK

      Re: am I missing something?

      A little primitive too, considering steganographic tools and techniques are pretty easily available.

  3. Milton

    But is it news?

    The article takes a slightly breathless tone as if this is novel, or brilliantly clever. But Reg readers will know that steganography is a technique older than computers, and a well-flogged horse in the crypto world.

    So I can only assume this is news because in this case some crims are doing it to nick card data?

    Because as sure as Yahoo is a Dead Brand Walking, black hats have been using steganography for all sorts of dirty deeds for at least a decade.

    1. Anonymous Coward
      Anonymous Coward

      Re: But is it news?

      In a similar vane... I'm off to patent doing this on a mobile device.

      1. Stoneshop
        Headmaster

        Re: But is it news?

        In a similar vane

        Ah, you're clearly aware of the way the wind blows in Patent Country.

    2. Gotno iShit Wantno iShit

      Re: But is it news?

      Feels like news to me. Sure it's not the most cunning of tricks - once you know it. I did not know that you can append random data to the end of a .jpg and the image is unaffected. I do know now. Obviously a sign of you've been hacked is unexpected changes to files on your system by unknown users but this is a change made by your own systems, harder to spot in logs.

      You might also scan your logs looking for your systems unexpectedly making tweets or sending emails to check for signs of exfiltration. This method would see your data going out the door and the logs would look perfectly normal. Would you notice an outgoing product image increase in size slightly? I would today, perhaps not yesterday.

  4. Amos1

    Old trick, actually

    Several years ago a university in Ohio noticed that the image file of their football team picture kept getting bigger and bigger and it was causing slow downloads. They thought it was corrupt so they replaced it and it happened again. Then they got wise and called in the techies. The same server was used for student fees and the malware was writing the card data to the football team picture using steganogaphy. They did have tight egress controls on the web server so this was a way to exfiltrate the data. Literally everyone who visited the page and saw the image of the football team was now in possession of stolen card numbers.

  5. Anonymous Coward
    Anonymous Coward

    Isn't this just called Steganography?

    The images still work, but data is included in the least significant bit (LSB). I probably missed the point of the article, but this isn't revolutionary.

    1. Robert Helpmann??
      Childcatcher

      Re: Isn't this just called Steganography?

      This is not a new technique, but it is not one that is well publicized, often used, or at least not caught very often. It offers some advantages as listed above in that it requires a one time only access to plant the code, the exfiltration makes use of the company's own resources and tracing the black hats becomes much more difficult as they have left fewer virtual breadcrumbs to follow. While it might not be new, the fact that we are reading about it now probably indicates that its use in the wild is on the upswing.

  6. DNTP

    How to beat this

    As Sun Tzu said, "the way to defeat a hacker is to turn his own weapons against him." Therefore to keep my credit cards safe I have encoded all the numbers into JPGs of beehives and then posted the pictures on the internet.

  7. israel_hands

    Tough Crowd

    I don't understand the tone of a lot of the comments in this article. Yes, steganography is ancient. But so is adding numbers together and yet I don't see articles on the unveiling of a new piece of hardware littered with comments saying "Yeah, but it just adds numbers, people have been adding numbers together since at least the late 70's."

    I didn't know you could append data to a jpg so simply and retain both the data and the image, and to my mind, this latest piece of work is a piece of minor genius. No need to leave a backdoor in the system, or risk getting traced when you try to get the data out, just wait for the serve it up to you while browsing. You could even just use a command-line daemon to pull the images and automate the whole process.

    It may not be a new idea, even the specific application of doctored jpgs may be old news, but it's a fucking clever implementation.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like