Google Tag Manager Is Used to Implement Web Skimmers on E-Commerce Sites

Recorded Future analysts have noticed that hackers are using Google Tag Manager (GTM) containers to inject electronic skimmers that then steal bank card details and personal information from shoppers on e-commerce sites.

Let me remind you that we also talked about the E-Commerce Software Developer FishPig Hacked in a Massive Supply Chain Attack.

GTM is used on thousands of sites for various metrics, customer tracking, and other marketing purposes. GTM uses containers to embed JavaScript and other resources on websites, and criminals have learned to hide malicious scripts in GTM containers, which allows them to steal personal information from customers.

In total, the researchers found 569 e-commerce domains infected with web skimmers. According to the report, 314 of them were confirmed to be infected with GTM skimmers, while another 255 sent stolen data to malicious domains linked to GTM abuse.

As of August 25, 2022, almost 90 of those domains were still infected, and researchers say it takes administrators, on average, more than three months to fix a breach.

Google Tag Manager

현재, 이상 165,000 payment cards belonging to victims of attacks that are associated with GTM containers are hosted in card shops on the dark web. The total number of payment cards compromised with GTM web skimmers is likely to be even higher.연구자들은 쓴다.

동시에, experts note that, judging by the discussions on the darknet, the abuse of GTM began in 2018, and was already used by various hack groups then.

We first reported GTM abuse in a 2021 보고서, and GTMs are heavily exploited to this day. 일부 경우에, the same malicious GTM buckets that were reported last year are used. We believe GTM usage will remain unchanged unless Google fixes the issue and implements active scanning to detect skimmer payloads inside GTM buckets.

기록된 미래 began tracking the use of three variants of GTM skimmers back in March 2021 and notes that new infected domains have been added every month since then.

Google Tag Manager

The first and third versions of the skimmers have a certain similarity, which suggests that the same hackers are behind their creation and that they regularly update their tools to avoid detection.

All three options use separate skimmer scripts and domains to extract data. All three options are currently used for active infections and were deployed to infect new domains in August 2022, meaning all three options pose a risk to e-commerce sites and their customers.the researchers say.

동시에, it is known that hackers are not only targetingexpensivedomains, which have more than a million visitors a month. Some of the sites that were attacked had only about 10,000 visitors.

Most of the affected sites are based in the US, accounting for more than 66% of infections. The rest have been found in Canada, Great Britain, Argentina, India, Italy, Australia, Brazil, Greece, Indonesia and other countries.

저자 소개

카리나 윌슨

이상으로 10 온라인 및 인쇄 매체에 대한 수년간의 글쓰기 경험, 나는 명확하고 매력적인 카피를 제공하는 전문가입니다..

최고의 SEO 카피라이팅 에이전시와 영국에서 가장 잘 알려진 브랜드를 위해 글을 썼습니다., 잡지와 신문.

코멘트를 남겨주세요