![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2A8fvkQpyVDuFUfRnkoWtr68iIqRmt7NGIXCgcexftJEd6AWUlAFfQXZ1MpBkG2mISzQxxYbfjoAdqBIH5MOo2hS3fM4h01q87OrjBRfX43U3-WMl-sK5yku5rSUla4yPcxNaUYcYtUr5WWjZy7Je0d1CSs_4Qnsr2FAjuL_3TofvjoTxcQ2m2DSqY6QY/s728-rw-e365/malware.png)
Threat actors have been observed leveraging Google Tag Manager (GTM) to provide credit card skimmer malware targeting Magento-based e-commerce websites.
Website security company Sucuri says that this code looks like a typical GTM and Google Analytics script used for website analytics and advertising purposes, but is obfuscated, which can provide permanent access to attackers. It said that backdoors are included.
At the time of writing, three sites have been found to be infected with the GTM identifier in question (GTM-MLHK2N68), down from the six reported by Sucuri. A GTM identifier refers to a container that contains various tracking codes (such as Google Analytics, Facebook Pixel, etc.) and rules that are triggered when certain conditions are met.
Further analysis reveals that the malware is loaded from the Magento database table “cms_block.content”, with the GTM tag containing an encoded JavaScript payload that acts as a credit card skimmer.
![Cybersecurity](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png)
“The script is designed to collect sensitive data entered by users during the checkout process and send it to a remote server controlled by an attacker,” said security researcher Puja Srivastava. .
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwuJSKhiPmlEdBdBTyjTLrj-Nn6ej40KVyY8VNje-dMITn0-gYgCiiylW8J3i5d85rBsmpcDb3iSaX7E4vS-coHvQyrDCZ3xy19gUYnfolbhTz2-JQHvcrqMu2M3lI0GsqNfVDfYZSqjGfFoydXdAIu5xlzCMR2TFKFninrn23-PFV_DglQji4lrNlVAWd/s728-rw-e365/code.png)
Once run, the malware is designed to steal credit card information from the checkout page and send it to an external server.
This is not the first time GTM has been abused for malicious purposes. In April 2018, Sucuri revealed that the tool was being used for fraud.
The development details another WordPress campaign where the company is likely to employ a vulnerability in a plugin or compromised administrator account and install malware that redirects site visitors to a malicious URL. It will take place a few weeks later.
Source link