Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Dark Side of Unicode: Cybercriminals Leverage Obfuscation Techniques to Hide Mongolian Skimmer Malware



A new digital skimmer campaign has been uncovered, leveraging Unicode obfuscation techniques to conceal a malicious malware dubbed "Mongolian Skimmer." This malware aims to steal sensitive data from e-commerce platforms, highlighting the ongoing cat-and-mouse game between cybersecurity researchers and cybercriminals. As businesses continue to rely on online transactions, it is essential that they take proactive measures to protect themselves against such threats.

  • Cybersecurity researchers have uncovered a new digital skimmer campaign that uses advanced obfuscation techniques to conceal a malicious skimmer dubbed "Mongolian Skimmer."
  • The script's obfuscation uses Unicode characters, making it difficult for humans to read and analyze.
  • The end goal is to steal sensitive data entered on e-commerce checkout or admin pages.
  • The malware employs well-known techniques to ensure compatibility across different browsers.
  • The skimmer attempts to evade analysis and debugging efforts by disabling certain functions when developer tools are opened.
  • A "unusual" loader variant loads the skimmer script only in response to user interaction events, serving as an anti-bot measure.
  • Cybercriminals continue to adapt their tactics to remain one step ahead of security researchers.
  • The Mongolian Skimmer's use of Unicode obfuscation techniques can be easily reverse-engineered by experts.
  • A larger scheme involving multiple skimmer actors has been uncovered, highlighting the increasing sophistication of these attacks.
  • Businesses and individuals must take proactive measures to protect themselves against such threats.



  • Cybersecurity researchers have uncovered a new digital skimmer campaign that leverages advanced obfuscation techniques, specifically Unicode characters, to conceal a malicious skimmer dubbed "Mongolian Skimmer." This recent discovery sheds light on the evolving tactics used by cybercriminals to evade detection and steal sensitive data from e-commerce platforms.

    At first glance, the script's obfuscation stood out due to its heavy use of accented characters. According to Jscrambler researchers, the unusual script seemed "bizarre" because of all the accented characters that made it difficult to read for humans. However, closer inspection revealed that the script was utilizing JavaScript's capability to employ any Unicode character in identifiers, effectively hiding the malicious functionality from human analysts.

    The end goal of this malware is to steal sensitive data entered on e-commerce checkout or admin pages, including financial information, which are then exfiltrated to an attacker-controlled server. This type of attack is particularly concerning for businesses that rely heavily on online transactions, as it can result in significant financial losses.

    Furthermore, the Mongolian Skimmer has been found to employ well-known techniques to ensure compatibility across different browsers by employing both modern and legacy event-handling techniques. This guarantees that it can target a wide range of users, regardless of their browser version. The skimmer also attempts to evade analysis and debugging efforts by disabling certain functions when a web browser's developer tools is opened.

    What makes this malware particularly noteworthy is the presence of an "unusual" loader variant that loads the skimmer script only in instances where user interaction events such as scrolling, mouse movements, and touchstart are detected. This technique not only serves as an effective anti-bot measure but also ensures that the loading of the skimmer does not cause performance bottlenecks.

    This is just another example of how cybercriminals continue to adapt and evolve their tactics in order to remain one step ahead of security researchers. In this case, the Mongolian Skimmer's use of Unicode obfuscation techniques appears to be a clever ruse, but as noted by Jscrambler researcher Pedro Fortuna, these techniques are not new and can be easily reverse-engineered.

    "The obfuscation techniques found on this skimmer may have looked to the untrained eye as a new obfuscation method," Fortuna said. "However, that was not the case. It used old techniques to appear more obfuscated, but they are just as easy to reverse." This statement highlights the ongoing cat-and-mouse game between cybersecurity researchers and cybercriminals.

    The Mongolian Skimmer is also notable for being part of a larger scheme involving multiple skimmer actors who interact with each other through source code comments. One threat actor even expressed interest in collaborating with another group, highlighting the increasingly sophisticated nature of these attacks.

    In light of this discovery, it is essential that businesses and individuals take proactive measures to protect themselves against such threats. This includes ensuring that all software and plugins are up-to-date, using reputable antivirus software, and being cautious when interacting with suspicious websites or emails.

    As the threat landscape continues to evolve, cybersecurity researchers will need to remain vigilant and adapt their techniques in order to stay ahead of the cybercriminals. The use of Unicode obfuscation techniques by cybercriminals is just one example of how these tactics are becoming increasingly sophisticated.

    In conclusion, the Mongolian Skimmer malware represents a significant threat to e-commerce platforms and individuals alike. Its use of advanced obfuscation techniques makes it difficult to detect, but as noted by Jscrambler researchers, these techniques are not new and can be easily reverse-engineered. As cybersecurity experts continue to work tirelessly to stay ahead of the cybercriminals, it is essential that businesses and individuals remain proactive in their efforts to protect themselves against such threats.



    Related Information:

  • https://thehackernews.com/2024/10/cybercriminals-use-unicode-to-hide.html

  • https://www.sepe.gr/en/it-technology/cybersecurity/22488057/cybercriminals-use-unicode-to-hide-mongolian-skimmer-in-e-commerce-platforms/


  • Published: Thu Oct 10 04:20:25 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us