Sigma Chi HQ

Main Menu

  • Home
  • Customer payment
  • Direct debit
  • Credit card
  • Digital wallets
  • Payment method

Sigma Chi HQ

Header Banner

Sigma Chi HQ

  • Home
  • Customer payment
  • Direct debit
  • Credit card
  • Digital wallets
  • Payment method
Credit card
Home›Credit card›Manual identification of an X-Cart credit card skimmer

Manual identification of an X-Cart credit card skimmer

By Meaghan H. Gonzales
May 5, 2022
3
0

During a recent investigation, a new customer informed us that his antivirus had detected a suspicious domain loading on the payment page of his website. We regularly receive reports like these as they are a telltale indicator of a credit card skimmer infection.

Our research and remediation teams frequently find credit card skimmers on Magento websites, and more recently on WordPress – however, in this case the client was using a lesser known e-commerce solution known as X -Cart. W3techs.com estimates that X-Cart has a CMS market share of less than 0.1%, while they rank WordPress and Adobe-based platforms such as Magento with a market share of 64% and 1.6 % respectively.

In the spirit of security education, we will describe the process used to investigate and manually detect a credit card skimmer in a compromised X-Cart environment, as well as some steps you can take to mitigate the risk to your own websites.

X-Cart Credit Card Thief Manual Detection

Before we get started, it’s important to note that JavaScript-based credit card skimmers are loaded and executed by the web browser of the website visitor itself, and are often designed to capture sensitive form inputs and exfiltrate data to a remote server. As the exfiltration is performed on the visitor’s browser, it makes it easier to identify them from a skimmer that runs on the server side.

Almost all modern web browsers offer a developer tools feature, which can be used to get additional information about what exactly is happening when you visit a website. the Network The feature easily logs every request from your browser when visiting a given page – and using it, we can see what’s going on “in the background”.

Our client had already identified the malicious domain as hxxps://metahtmlhead[.]com, which gave us a starting point for our investigation. The next step was to identify malicious requests in our developer tools.

JavaScript malware can instruct third parties to exfiltrate sensitive data without the knowledge of the website visitor – unless they are monitoring their network traffic, in which case requests to a suspicious server are immediately clear:

Did you know? 
It’s not uncommon for JavaScript malware to detect the presence of having your browser’s developer tools open, and refuse to execute if so. You can combat this by using system network monitoring tools instead, or even by detaching the developer tools from your current browser window.

Once we identified the malicious request in our dev tools, we were able to check the initiator of the request in the same window to determine exactly which line of code the request came from.

While the initiator can usually be a file, such as /cart.php or /analytics.jsthe initiator in our case was VM338:1. The “VM” prefix generally indicates that the JavaScript was executed via the eval() function, a common tactic among malware writers. We can mouse over the initiator to see the execution chain.

For example, a eval() loading the statement from line 5 of a website’s index file would look like this:

Eval statement in index file

Following the chain on suspicious requests loading on the client basket.php file, we have identified the infection loading from a eval() statement buried about 3,000 lines in the website’s HTML source code:

Credit card skimmer infection on hacked xcart site

With the original code in hand, this allows us to search the website’s files and database to determine exactly where it is placed on the server. A search for the string eval(decodeURIComponent(‘(function gave results: this infection was added to a main X-Cart file with the path ./skin/common_files/check_cc_number_script.tpl.

The model file check_cc_number_script.tpl was originally intended to validate entered credit card details – to ensure, for example, that the CVV field was not left blank before payment was submitted. The attacker’s injection of malicious code into this file is all that is required for the website to send the credit card details entered in the payment page to a malicious server.

Automated detection and mitigation steps

There’s no doubt that manually detecting and removing a credit card skimmer can be a lot of work, and it’s not possible for a business owner to spend hours a day manually monitoring everything. which loads on its website.

If you’re looking for an automated solution, Sucuri’s website security monitoring regularly scans your environment for credit card skimming infections like these. Whenever issues are discovered, you will be immediately notified through our customizable alert system so investigation and resolution can begin.

For site owners who need a helping hand with cleanup, our website malware removal services can help you detect and remove credit card skimmers, backdoors, or other malicious infections found in your site environment.

Related posts:

  1. Gemini 2021 credit card review – Forbes Advisor
  2. Lloyds Bank Launches New Cashback Credit Card: Is It Good?
  3. AVL “hustle” or “glitch” parking? Credit card only?
  4. Banks limiting overdraft fees; Credit card debt has increased during the pandemic
  • Credit card
  • Customer payment
  • Digital wallets
  • Direct debit
  • Payment method
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • September 2018
  • July 2018
  • May 2018
  • April 2018
  • March 2018
  • January 2018
  • December 2017
  • October 2017
  • August 2017
  • April 2017
  • December 2016
  • November 2016
  • October 2016
  • June 2016
  • April 2016
  • December 2015
  • August 2015
  • May 2015
  • March 2014
  • September 2013
  • March 2012
  • How to spot predatory lenders
  • Digital Wallet Market to See Amazing Growth by 2031 – Carbon Valley Farmer and Miner
  • Microsoft warning that scammers could spoof your credit card with an online payment trick – how to stay safe
  • CFPB and New York Attorney General end debt collection ring
  • Two Chandigarh residents lose ₹3.9 lakh in credit card fraud
  • Privacy Policy
  • Terms and Conditions