Jump to content

Hackers have planted credit card stealing malware on local government payment sites


NelsonG

Recommended Posts

Security firm FireEye has confirmed that a widely used web payment portal used to pay for local government services, like utilities and permits, has been targeted by hackers.

Hackers have broken into self-hosted Click2Gov servers operated by local governments across the US, likely using a vulnerability in the portal’s web server that allowed the attacker to upload malware to siphon off payment card data over a period of “weeks to numerous months,” Nick Richard, principal threat intelligence analyst at FireEye, told TechCrunch.

Superion, a major technology provider that owns the web payment portal Click2Gov, said in June following a confirmed breach last year that there was “no evidence” that the portal was unsafe to use amid reports of suspicious activity by customers. Superion issued patches after several customers complained that their credit card information had been stolen, but said that it was largely up to local governments and municipalities to patch their servers.

But since then, several more local government sites were identified as victims of the malware.

FireEye’s incident response arm Mandiant said the hacker used the server vulnerability to upload a tool, which it calls FIREALARM, to sift through server log data for credit card data, while another piece of malware it’s calling SPOTLIGHT to intercept credit card data from unencrypted network traffic. Once collected, the data is encoded and exfiltrated by the hacker.

Credit card numbers, expiration dates, and verification numbers, along with names and addresses were stolen by the malware, the security firm said.

But Richard said it’s not known how many victims there are for each compromised server.

“Any web server running an unpatched version of Oracle WebLogic would be vulnerable to exploitation, thus allowing an attacker to access the web server to manipulate Click2Gov configuration settings and upload malware,” said Richard.

FireEye did not say who was to blame for the attacks but said it was “likely” a team of hackers, given the skills necessary to pull off the attack.

“There is much left to be uncovered about this attacker,” FireEye said in a blog post, and anticipates that the hackers will “continue to conduct interactive and financially motivated attacks.”

Superion told TechCrunch that it has “diligently kept our customers informed while working with them to update available patches for the third-party software that contributed to the issue,” and that none of its cloud customers are affected.

Techcrunch?d=2mJPEYqXBVI Techcrunch?d=7Q72WNTAKBA Techcrunch?d=yIl2AUoC8zA Techcrunch?i=pziq3rWiZeo:dRQeMMOkfUU:-BT Techcrunch?i=pziq3rWiZeo:dRQeMMOkfUU:D7D Techcrunch?d=qj6IDK7rITs
pziq3rWiZeo

View the full article

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Our picks

    • Wait, Burning Man is going online-only? What does that even look like?
      You could have been forgiven for missing the announcement that actual physical Burning Man has been canceled for this year, if not next. Firstly, the nonprofit Burning Man organization, known affectionately to insiders as the Borg, posted it after 5 p.m. PT Friday. That, even in the COVID-19 era, is the traditional time to push out news when you don't want much media attention. 
      But secondly, you may have missed its cancellation because the Borg is being careful not to use the C-word. The announcement was neutrally titled "The Burning Man Multiverse in 2020." Even as it offers refunds to early ticket buyers, considers layoffs and other belt-tightening measures, and can't even commit to a physical event in 2021, the Borg is making lemonade by focusing on an online-only version of Black Rock City this coming August.    Read more...
      More about Burning Man, Tech, Web Culture, and Live EventsView the full article
      • 0 replies
    • Post in What Are You Listening To?
      Post in What Are You Listening To?
    • Post in What Are You Listening To?
      Post in What Are You Listening To?
    • Post in What Are You Listening To?
      Post in What Are You Listening To?
    • Post in What Are You Listening To?
      Post in What Are You Listening To?
×
×
  • Create New...