New Payment Data Stealing Malware Hides in Nginx Process on Linux Servers

E-commerce platforms in the U.S., Germany, and France have come under attack from a new form of malware that targets Nginx servers in an attempt to masquerade its presence and slip past detection by security solutions.

“This novel code injects itself into a host Nginx application and is nearly invisible,” Sansec Threat Research team said in a new report. “The parasite is used to steal data from eCommerce servers, also known as ‘server-side Magecart.'”

A free and open-source software, Nginx is a web server that can also be used as a reverse proxy, load balancer, mail proxy, and HTTP cache. NginRAT, as the advanced malware is called, works by hijacking a host Nginx application to embed itself into the webserver process.

The remote access trojan itself is delivered via CronRAT, another piece of malware the Dutch cybersecurity firm disclosed last week as hiding its malicious payloads in cron jobs scheduled to execute on February 31st, a non-existent calendar day.

Both CronRAT and NginRAT are designed to provide a remote way into the compromised servers, and the goal of the intrusions is to make server-side modifications to the compromised e-commerce websites in a manner that enable the adversaries to exfiltrate data by skimming online payment forms.

The attacks, collectively known as Magecart or web skimming, are the work of a cybercrime syndicate comprised of dozens of subgroups that are involved in digital credit card theft by exploiting software vulnerabilities to gain access to an online portal’s source code and insert malicious JavaScript code that siphons the data shoppers enter into checkout pages.

“Skimmer groups are growing rapidly and targeting various e-commerce platforms using a variety of ways to remain undetected,” Zscaler researchers noted in an analysis of the latest Magecart trends published earlier this year.

“The latest techniques include compromising vulnerable versions of e-commerce platforms, hosting skimmer scripts on CDNs and cloud services, and using newly registered domains (NRDs) lexically close to any legitimate web service or specific e-commerce store to host malicious skimmer scripts.”

You May Also Like

3 thoughts on “New Payment Data Stealing Malware Hides in Nginx Process on Linux Servers

  1. I have discovered some new things from your internet site about personal computers. Another thing I’ve always imagined is that laptop computers have become an item that each household must have for many people reasons. They supply you with convenient ways in which to organize households, pay bills, shop, study, focus on music as well as watch television shows. An innovative method to complete these types of tasks has been a laptop. These desktops are mobile, small, highly effective and transportable.

  2. I know of the fact that now, more and more people are attracted to camcorders and the issue of digital photography. However, being a photographer, you must first shell out so much time period deciding the model of dslr camera to buy plus moving from store to store just so you can buy the most affordable camera of the trademark you have decided to settle on. But it isn’t going to end now there. You also have take into consideration whether you can purchase a digital camera extended warranty. Thanks alot : ) for the good points I obtained from your blog site.

Leave a Reply

Your email address will not be published. Required fields are marked *


Unique Visitors
» 177 Today
» 30,249 Yesterday
» 58,522 This Week
» 177 This Month
» 3,640,322 This Year
» 19,875,417 Total (since 2019-12-11)
» Record: 205,757 (2023-08-13)
Counter by DarkWeb.Solutions