Security News > 2021 > December > New Payment Data Stealing Malware Hides in Nginx Process on Linux Servers

New Payment Data Stealing Malware Hides in Nginx Process on Linux Servers
2021-12-03 01:34

E-commerce platforms in the U.S., Germany, and France have come under attack from a new form of malware that targets Nginx servers in an attempt to masquerade its presence and slip past detection by security solutions.

"This novel code injects itself into a host Nginx application and is nearly invisible," Sansec Threat Research team said in a new report.

NginRAT, as the advanced malware is called, works by hijacking a host Nginx application to embed itself into the webserver process.

Both CronRAT and NginRAT are designed to provide a remote way into the compromised servers, and the goal of the intrusions is to make server-side modifications to the compromised e-commerce websites in a manner that enable the adversaries to exfiltrate data by skimming online payment forms.

The attacks, collectively known as Magecart or web skimming, are the work of a cybercrime syndicate comprised of dozens of subgroups that are involved in digital credit card theft by exploiting software vulnerabilities to gain access to an online portal's source code and insert malicious JavaScript code that siphons the data shoppers enter into checkout pages.

"The latest techniques include compromising vulnerable versions of e-commerce platforms, hosting skimmer scripts on CDNs and cloud services, and using newly registered domains lexically close to any legitimate web service or specific e-commerce store to host malicious skimmer scripts."


News URL

https://thehackernews.com/2021/12/new-payment-data-sealing-malware-hides.html

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Linux 11 64 2532 1569 67 4232
Nginx 2 0 3 1 4 8