Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Segway Store Hacked to Steal Customers’ Credit Cards

Segway Store Hacked to Steal Customers’ Credit Cards

Segway’s online store was compromised to include a malicious Magecart script that potentially allowed threat actors to steal credit cards and customer information during checkout.

Segway is the maker of the iconic two-wheeled self-balancing personal transporters and a range of other types of human transportation devices.

These personal vehicles are typically used by security personnel in patrols, tourists in city tours, golfers, in various logistic applications, and for short-distance leisure rides.

Also Read: The DNC Singapore: Looking At 2 Sides Better

Malicious favicons load malicious scripts

MageCart attacks are when threat actors compromise a site to introduce malicious scripts that steal credit card and customer information when people make a purchase.

However, security software has gotten better over the past few years at detecting these malicious scripts, forcing threat actors to develop better ways to hide them.

One such way is to embed the malicious credit card skimmer in normally innocuous favicon files, image files used to display a small icon (usually the site’s logo) in a web page’s tab.

According to a report by Malwarebytes Labs, threat actors added JavaScript to Segway’s online store (store.segway.com) that pretended to display the site’s copyright. In reality, the script loaded an external favicon that contained the malicious credit card stealing script.

The external URL used for loading the remote resource
The external URL used for loading the malicious favicon
Source: Malwarebytes

While this malicious favicon file does contain an image and is properly displayed by the browser, it also included the credit card skimmer script used to steal payment information. However, this script won’t be seen unless you analyze it using a hex editor, as shown below.

Also Read: 4 Best Practices On How To Use SkillsFuture Credit

Skimmer loading function embedded in the favicon
Skimmer loading function embedded in the favicon
Source: Malwarebytes

This technique has been well-documented and employed by skillful Magecart groups since 2020 to compromise the websites of Claire’sTupperwareSmith & WessonMacy’s, and British Airways.

Magecart Group 12

Malwarebytes says the attackers responsible for the compromise are part of the Magecart Group 12 group, a financially motivated collective that has been stealing credit card details since at least 2019.

The researchers say the malicious code has been active on Segway’s website since at least January 6, 2021, and that they contacted the company to inform them of the attack.

BleepingComputer has confirmed that at the time of writing this, the malicious code is still present on the site and is blocked by numerous security products.

ESET blocking access to Segway's online store
ESET blocking access to Segway’s online store

Malwarebytes’ analysts believe that the Magecart actors exploited a vulnerability in the Magento CMS used by the store or in one of its plugins to inject their malicious code.

The telemetry data shows that most customers of the Segway store come from the United States (55%), while Australia follows at second place with a significant 39%.

BleepingComputer has contacted Segway to learn more about this attack but did not receive a response at this time.

How to stay safe

The Segway store compromise is yet another example of how threat actors can target even the sites of renowned brands with a long history of trustworthiness.

Consumers should pay with electronic methods, one-time cards, cards with strict charging limits, or simply choose cash on delivery if possible to avoid these types of attacks.

Additionally, using an internet security tool that detects and stops malicious JavaScript from loading on checkout pages could save you the trouble of having your credit card details stolen.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us