Picreel and Alpaca Forms project code spoofing resulted in 4684 sites being compromised

Security researcher Willem de Groot сообщилthat, as a result of hacking the infrastructure, the attackers were able to introduce a malicious insert into the code of the web analytics system Picreel and an open platform for generating interactive web forms Alpaca Forms. The substitution of the JavaScript code led to the compromise of 4684 sites that use these systems on their pages (1249 β€” Picreel and 3435 - Alpaca Forms).

Embedded malicious code collected information about filling in all web forms on the sites, and could also lead to the interception of entering payment information and authentication parameters. The intercepted information was sent to the font-assets.com server under the guise of an image request. There is no information on exactly how the Picreel infrastructure and the CDN network for delivering the Alpaca Forms script were compromised. It is only known that during the attack on Alpaca Forms, the scripts supplied through the Cloud CMS content delivery network were substituted. Malicious insert was camouflaged as an array of data in minified version script (decryption of the code can be viewed here).

Picreel and Alpaca Forms project code spoofing resulted in 4684 sites being compromised

Among the users of compromised projects are many large companies, including Sony, Forbes, Trustico, FOX, ClassesUSA, 3Dcart, Saxo Bank, Foundr, RocketInternet, Sprit and Virgin Mobile. Given that this is not the first attack of its kind (see incident with the substitution of the StatCounter counter), site administrators are advised to be very careful about placing third-party JavaScript code, especially on pages related to payments and authentication.

Source: opennet.ru

Add a comment