The Magecart group Fullz House has injected the website of a mobile service provider with a credit card stealer. Magecart is the umbrella term used for all cyber-related crime groups that use malware and other malicious scripts to steal credit card information from any website that can have credit card information imputed into it. This most recent attack was targeted at users of the US Mobile Virtual Network Operator (MVNO) BOOM! Mobile. The group used a card skimmer on BOOM! website to exfiltrate card data that was entered onto the website. A single line of code disguised as a Google Analytics script loads an external JavaScript library to steal the card data. Malwarebytes identified the attacks but did not discover the exact way the group infiltrated the website. Email attacks were also seen in conjunction with the skimming code. As previously reported by researchers at RiskIQ, Fullz House is known to use skimmer and phishing emails to steal both credit card data that is entered into websites and data that is provided to the threat actor via the phishing email.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security