Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Phantse sonke sisebenzisa iinkonzo zeevenkile ze-intanethi, oku kuthetha ukuba ngokukhawuleza okanye kamva sibeka umngcipheko wokuba lixhoba le-JavaScript sniffers - ikhowudi ekhethekileyo abahlaseli abaphumeza ngayo kwiwebhusayithi ukuba idatha yekhadi lebhanki, iidilesi, ukungena kunye neephasiwedi zabasebenzisi. .

Bamalunga nama-400 abasebenzisi bewebhusayithi yeBritish Airways kunye nesicelo esiphathwayo sele bachatshazelwe ngabantu abarhafayo, kunye neendwendwe kwiwebhusayithi yaseBritane yesigebenga sezemidlalo iFILA kunye nomsasazi wamatikiti waseMelika iTicketmaster. I-PayPal, i-Chase Paymenttech, i-USAePay, i-Moneris - ezi kunye nezinye iinkqubo ezininzi zokuhlawula zosulelekile.

I-Threat Intelligence Group-IB umhlalutyi uViktor Okorokov uthetha malunga nendlela abathuki abangena ngayo ikhowudi yewebhusayithi kwaye beba ulwazi lwentlawulo, kunye nokuba yeyiphi iCRM abayihlaselayo.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

"Isisongelo esifihliweyo"

Kwenzekile ukuba ixesha elide i-JS sniffers yahlala ingabonakali kubahlalutyi be-anti-virus, kwaye iibhanki kunye neenkqubo zokuhlawula azizange zibone njengengozi enkulu. Kwaye ngokupheleleyo ngelize. Iingcali zeQela-IB ihlalutyiwe Iivenkile ezingama-2440 ezosulelekileyo kwi-Intanethi, iindwendwe zazo - zizonke zabantu abamalunga ne-1,5 yesigidi ngosuku - babesemngciphekweni wokulalanisa. Phakathi kwamaxhoba akubona abasebenzisi kuphela, kodwa nakwiivenkile ze-intanethi, iinkqubo zokuhlawula kunye neebhanki ezikhuphe amakhadi aphazamisekile.

Ingxelo Iqela le-IB laba sisifundo sokuqala semakethi ye-darknet yabantu abanukayo, iziseko zabo kunye neendlela zokwenza imali, ezisa abadali babo izigidi zeedola. Sichonge iintsapho ezingama-38 zabanuki, apho zazili-12 kuphela ezaziwa ngaphambili ngabaphandi.

Makhe sihlale banzi kwiintsapho ezine zabaphunga ezifundwe ngexesha lokufunda.

ReactGet Family

I-Sniffers yosapho lwe-ReactGet isetyenziselwa ukubiwa idatha yekhadi lebhanki kwiindawo zokuthenga kwi-intanethi. I-sniffer ingasebenza kunye nenani elikhulu leenkqubo ezahlukeneyo zokuhlawula ezisetyenziswa kwisiza: ixabiso leparameter enye ihambelana nenkqubo yokuhlawula enye, kunye neenguqulelo ezichongiweyo zomntu ngamnye zingasetyenziselwa ukuba iziqinisekiso, kunye nokuba idatha yekhadi lebhanki kwintlawulo. Iifomu zeenkqubo ezininzi zokuhlawula ngaxeshanye, ezifana nebizwa ngokuba yi-universal sniffer. Kwafunyaniswa ukuba kwezinye iimeko, abahlaseli baqhuba ukuhlaselwa kwe-phishing kubalawuli beevenkile ze-intanethi ukuze bafumane ukufikelela kwiphaneli yolawulo lwesayithi.

Iphulo elisebenzisa olu sapho lwabaqhubi laqala ngoMeyi ka-2017; iisayithi eziqhuba iCMS kunye neMagento, iBigcommerce, kunye namaqonga akwaShopify ahlaselwa.

Iphunyezwa njani iReactGet kwikhowudi yevenkile ekwi-intanethi

Ukongeza kwi-"classic" yokuphunyezwa kweskripthi ngekhonkco, abaqhubi bentsapho ye-ReactGet ye-sniffers basebenzisa ubuchule obukhethekileyo: usebenzisa ikhowudi yeJavaScript, bahlola ukuba idilesi yangoku apho umsebenzisi ekhoyo ihlangabezana nemilinganiselo ethile. Ikhowudi engalunganga iya kuphunyezwa kuphela ukuba umtya osezantsi ukhona kwi-URL yangoku phuma okanye Inyathelo elinye lokuphuma, iphepha elinye/, ngaphandle/iphepha elinye, ukuphuma/enye, ukuphuma/enye. Ngaloo ndlela, ikhowudi ye-sniffer iya kuphunyezwa kanye ngelo xesha xa umsebenzisi eqhubeka nokuhlawula ukuthenga kwaye afake ulwazi lokuhlawula kwifom kwisayithi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Le sniffer isebenzisa ubuchule obungekho mgangathweni. Intlawulo yexhoba kunye neenkcukacha zobuqu ziqokelelwa kunye kwaye zifakwe ngekhowudi kusetyenziswa isiseko64, kwaye ke umtya obangelwayo usetyenziswa njengeparameter ukuthumela isicelo kwiwebhusayithi yabahlaseli. Ngokuqhelekileyo, indlela eya esangweni ixelisa ifayile yeJavaScript, umzekelo impendulo.js, idatha.js njalo njalo, kodwa amakhonkco kwiifayile zemifanekiso nazo ziyasetyenziswa, GIF и JPG. Into engaqhelekanga kukuba i-sniffer yenza into yomfanekiso enomlinganiselo we-1 nge-pixel e-1 kwaye isebenzisa ikhonkco elifunyenwe ngaphambili njengeparameter. src Imifanekiso. Oko kukuthi, kumsebenzisi isicelo esinjalo kwitrafikhi siya kujongeka njengesicelo somfanekiso oqhelekileyo. Ubuchule obufanayo busetyenziswe kusapho lwe-ImageID yabaqhubi. Ukongeza, ubuchule bokusebenzisa umfanekiso we-pixel ka-1 nge-1 busetyenziswa kwizikripthi ezininzi ezisemthethweni zohlalutyo lwe-intanethi, ezinokuthi zilahlekise umsebenzisi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Uhlalutyo lwenguqulelo

Uhlalutyo lwemimandla esebenzayo esetyenziswa ngabaqhubi be-ReactGet sniffer luveze iinguqulelo ezininzi ezahlukeneyo zolu sapho lwabarhafi. Iinguqulelo ziyahluka kubukho okanye ukungabikho kwe-obfuscation, kwaye ukongezelela, i-sniffer nganye yenzelwe inkqubo ethile yokuhlawula eqhuba iintlawulo zekhadi lebhanki kwiivenkile ze-intanethi. Emva kokuhlelwa ngexabiso leparameter ehambelana nenombolo yoguqulelo, iingcali zeQela-IB zifumene uluhlu olupheleleyo lweenguqu ezikhoyo ze-sniffer, kwaye ngamagama eefom zefom ezijonga i-sniffer nganye kwikhowudi yephepha, zichonge iinkqubo zokuhlawula. lowo umphunga ujolise kuyo.

Uluhlu lwabarhoxileyo kunye neenkqubo zabo zokuhlawula ezihambelanayo

I-URL ye-sniffer Inkqubo yokuhlawula
reactjsapi.com/react.js Gunyazisa.Net
ajaxstatic.com/api.js?v=2.1.1 Ugcino lwekhadi
ajaxstatic.com/api.js?v=2.1.2 Gunyazisa.Net
ajaxstatic.com/api.js?v=2.1.3 Gunyazisa.Net
ajaxstatic.com/api.js?v=2.1.4 eWAY Rapid
ajaxstatic.com/api.js?v=2.1.5 Gunyazisa.Net
ajaxstatic.com/api.js?v=2.1.6 Adyen
ajaxstatic.com/api.js?v=2.1.7 USAePay
ajaxstatic.com/api.js?v=2.1.9 Gunyazisa.Net
apittatus.com/api.js?v=2.1.1 USAePay
apittatus.com/api.js?v=2.1.2 Gunyazisa.Net
apittatus.com/api.js?v=2.1.3 Moneris
apittatus.com/api.js?v=2.1.5 USAePay
apittatus.com/api.js?v=2.1.6 PayPal
apittatus.com/api.js?v=2.1.7 SagePay
apittatus.com/api.js?v=2.1.8 Verisign
apittatus.com/api.js?v=2.1.9 PayPal
apittatus.com/api.js?v=2.3.0 ngombala
apittatus.com/api.js?v=3.0.2 Realex
apittatus.com/api.js?v=3.0.3 PayPal
apittatus.com/api.js?v=3.0.4 IkhonkcoPoint
apittatus.com/api.js?v=3.0.5 PayPal
apittatus.com/api.js?v=3.0.7 PayPal
apittatus.com/api.js?v=3.0.8 DataCash
apittatus.com/api.js?v=3.0.9 PayPal
asianfoodgracer.com/footer.js Gunyazisa.Net
billgetstatus.com/api.js?v=1.2 Gunyazisa.Net
billgetstatus.com/api.js?v=1.3 Gunyazisa.Net
billgetstatus.com/api.js?v=1.4 Gunyazisa.Net
billgetstatus.com/api.js?v=1.5 Verisign
billgetstatus.com/api.js?v=1.6 Gunyazisa.Net
billgetstatus.com/api.js?v=1.7 Moneris
billgetstatus.com/api.js?v=1.8 SagePay
billgetstatus.com/api.js?v=2.0 USAePay
billgetstatus.com/react.js Gunyazisa.Net
cloudodesc.com/gtm.js?v=1.2 Gunyazisa.Net
cloudodesc.com/gtm.js?v=1.3 ANZ eGate
cloudodesc.com/gtm.js?v=2.3 Gunyazisa.Net
cloudodesc.com/gtm.js?v=2.4 Moneris
cloudodesc.com/gtm.js?v=2.6 SagePay
cloudodesc.com/gtm.js?v=2.7 SagePay
cloudodesc.com/gtm.js?v=2.8 Chase Paymentech
cloudodesc.com/gtm.js?v=2.9 Gunyazisa.Net
cloudodesc.com/gtm.js?v=2.91 Adyen
cloudodesc.com/gtm.js?v=2.92 PsiGate
cloudodesc.com/gtm.js?v=2.93 Umthombo weCyber
cloudodesc.com/gtm.js?v=2.95 ANZ eGate
cloudodesc.com/gtm.js?v=2.97 Realex
geissee.com/gs.js USAePay
gtmproc.com/age.js Gunyazisa.Net
gtmproc.com/gtm.js?v=1.2 Gunyazisa.Net
gtmproc.com/gtm.js?v=1.3 ANZ eGate
gtmproc.com/gtm.js?v=1.5 PayPal
gtmproc.com/gtm.js?v=1.6 PayPal
gtmproc.com/gtm.js?v=1.7 Realex
livecheckpay.com/api.js?v=2.0 SagePay
livecheckpay.com/api.js?v=2.1 PayPal
livecheckpay.com/api.js?v=2.2 Verisign
livecheckpay.com/api.js?v=2.3 Gunyazisa.Net
livecheckpay.com/api.js?v=2.4 Verisign
livecheckpay.com/react.js Gunyazisa.Net
livegetpay.com/pay.js?v=2.1.2 ANZ eGate
livegetpay.com/pay.js?v=2.1.3 PayPal
livegetpay.com/pay.js?v=2.1.5 Umthombo weCyber
livegetpay.com/pay.js?v=2.1.7 Gunyazisa.Net
livegetpay.com/pay.js?v=2.1.8 SagePay
livegetpay.com/pay.js?v=2.1.9 Realex
livegetpay.com/pay.js?v=2.2.0 Umthombo weCyber
livegetpay.com/pay.js?v=2.2.1 PayPal
livegetpay.com/pay.js?v=2.2.2 PayPal
livegetpay.com/pay.js?v=2.2.3 PayPal
livegetpay.com/pay.js?v=2.2.4 Verisign
livegetpay.com/pay.js?v=2.2.5 eWAY Rapid
livegetpay.com/pay.js?v=2.2.7 SagePay
livegetpay.com/pay.js?v=2.2.8 SagePay
livegetpay.com/pay.js?v=2.2.9 Verisign
livegetpay.com/pay.js?v=2.3.0 Gunyazisa.Net
livegetpay.com/pay.js?v=2.3.1 Gunyazisa.Net
livegetpay.com/pay.js?v=2.3.2 ISango lokuqala leDatha yeHlabathi
livegetpay.com/pay.js?v=2.3.3 Gunyazisa.Net
livegetpay.com/pay.js?v=2.3.4 Gunyazisa.Net
livegetpay.com/pay.js?v=2.3.5 Moneris
livegetpay.com/pay.js?v=2.3.6 Gunyazisa.Net
livegetpay.com/pay.js?v=2.3.8 PayPal
livegetpay.com/pay.js?v=2.4.0 Verisign
maxstatics.com/site.js USAePay
mediapack.info/track.js?d=funlove.com USAePay
mediapack.info/track.js?d=qbedding.com Gunyazisa.Net
mediapack.info/track.js?d=vseyewear.com Verisign
mxcounter.com/c.js?v=1.2 PayPal
mxcounter.com/c.js?v=1.3 Gunyazisa.Net
mxcounter.com/c.js?v=1.4 ngombala
mxcounter.com/c.js?v=1.6 Gunyazisa.Net
mxcounter.com/c.js?v=1.7 eWAY Rapid
mxcounter.com/c.js?v=1.8 SagePay
mxcounter.com/c.js?v=2.0 Gunyazisa.Net
mxcounter.com/c.js?v=2.1 IBraintree
mxcounter.com/c.js?v=2.10 IBraintree
mxcounter.com/c.js?v=2.2 PayPal
mxcounter.com/c.js?v=2.3 SagePay
mxcounter.com/c.js?v=2.31 SagePay
mxcounter.com/c.js?v=2.32 Gunyazisa.Net
mxcounter.com/c.js?v=2.33 PayPal
mxcounter.com/c.js?v=2.34 Gunyazisa.Net
mxcounter.com/c.js?v=2.35 Verisign
mxcounter.com/click.js?v=1.2 PayPal
mxcounter.com/click.js?v=1.3 Gunyazisa.Net
mxcounter.com/click.js?v=1.4 ngombala
mxcounter.com/click.js?v=1.6 Gunyazisa.Net
mxcounter.com/click.js?v=1.7 eWAY Rapid
mxcounter.com/click.js?v=1.8 SagePay
mxcounter.com/click.js?v=2.0 Gunyazisa.Net
mxcounter.com/click.js?v=2.1 IBraintree
mxcounter.com/click.js?v=2.2 PayPal
mxcounter.com/click.js?v=2.3 SagePay
mxcounter.com/click.js?v=2.31 SagePay
mxcounter.com/click.js?v=2.32 Gunyazisa.Net
mxcounter.com/click.js?v=2.33 PayPal
mxcounter.com/click.js?v=2.34 Gunyazisa.Net
mxcounter.com/click.js?v=2.35 Verisign
mxcounter.com/cnt.js Gunyazisa.Net
mxcounter.com/j.js Gunyazisa.Net
newrelicnet.com/api.js?v=1.2 Gunyazisa.Net
newrelicnet.com/api.js?v=1.4 Gunyazisa.Net
newrelicnet.com/api.js?v=1.8 SagePay
newrelicnet.com/api.js?v=4.5 SagePay
newrelicnet.com/api.js?v=4.6 Westpac PayWay
nr-public.com/api.js?v=2.0 PayFort
nr-public.com/api.js?v=2.1 PayPal
nr-public.com/api.js?v=2.2 Gunyazisa.Net
nr-public.com/api.js?v=2.3 ngombala
nr-public.com/api.js?v=2.4 ISango lokuqala leDatha yeHlabathi
nr-public.com/api.js?v=2.5 PsiGate
nr-public.com/api.js?v=2.6 Gunyazisa.Net
nr-public.com/api.js?v=2.7 Gunyazisa.Net
nr-public.com/api.js?v=2.8 Moneris
nr-public.com/api.js?v=2.9 Gunyazisa.Net
nr-public.com/api.js?v=3.1 SagePay
nr-public.com/api.js?v=3.2 Verisign
nr-public.com/api.js?v=3.3 Moneris
nr-public.com/api.js?v=3.5 PayPal
nr-public.com/api.js?v=3.6 IkhonkcoPoint
nr-public.com/api.js?v=3.7 Westpac PayWay
nr-public.com/api.js?v=3.8 Gunyazisa.Net
nr-public.com/api.js?v=4.0 Moneris
nr-public.com/api.js?v=4.0.2 PayPal
nr-public.com/api.js?v=4.0.3 Adyen
nr-public.com/api.js?v=4.0.4 PayPal
nr-public.com/api.js?v=4.0.5 Gunyazisa.Net
nr-public.com/api.js?v=4.0.6 USAePay
nr-public.com/api.js?v=4.0.7 EBizCharge
nr-public.com/api.js?v=4.0.8 Gunyazisa.Net
nr-public.com/api.js?v=4.0.9 Verisign
nr-public.com/api.js?v=4.1.2 Verisign
ordercheckpays.com/api.js?v=2.11 Gunyazisa.Net
ordercheckpays.com/api.js?v=2.12 PayPal
ordercheckpays.com/api.js?v=2.13 Moneris
ordercheckpays.com/api.js?v=2.14 Gunyazisa.Net
ordercheckpays.com/api.js?v=2.15 PayPal
ordercheckpays.com/api.js?v=2.16 PayPal
ordercheckpays.com/api.js?v=2.17 Westpac PayWay
ordercheckpays.com/api.js?v=2.18 Gunyazisa.Net
ordercheckpays.com/api.js?v=2.19 Gunyazisa.Net
ordercheckpays.com/api.js?v=2.21 SagePay
ordercheckpays.com/api.js?v=2.22 Verisign
ordercheckpays.com/api.js?v=2.23 Gunyazisa.Net
ordercheckpays.com/api.js?v=2.24 PayPal
ordercheckpays.com/api.js?v=2.25 PayFort
ordercheckpays.com/api.js?v=2.29 Umthombo weCyber
ordercheckpays.com/api.js?v=2.4 PayPal Payflow Pro
ordercheckpays.com/api.js?v=2.7 Gunyazisa.Net
ordercheckpays.com/api.js?v=2.8 Gunyazisa.Net
ordercheckpays.com/api.js?v=2.9 Verisign
ordercheckpays.com/api.js?v=3.1 Gunyazisa.Net
ordercheckpays.com/api.js?v=3.2 Gunyazisa.Net
ordercheckpays.com/api.js?v=3.3 SagePay
ordercheckpays.com/api.js?v=3.4 Gunyazisa.Net
ordercheckpays.com/api.js?v=3.5 ngombala
ordercheckpays.com/api.js?v=3.6 Gunyazisa.Net
ordercheckpays.com/api.js?v=3.7 Gunyazisa.Net
ordercheckpays.com/api.js?v=3.8 Verisign
ordercheckpays.com/api.js?v=3.9 PayPal
ordercheckpays.com/api.js?v=4.0 Gunyazisa.Net
ordercheckpays.com/api.js?v=4.1 Gunyazisa.Net
ordercheckpays.com/api.js?v=4.2 SagePay
ordercheckpays.com/api.js?v=4.3 Gunyazisa.Net
reactjsapi.com/api.js?v=0.1.0 Gunyazisa.Net
reactjsapi.com/api.js?v=0.1.1 PayPal
reactjsapi.com/api.js?v=4.1.2 lenyengane
reactjsapi.com/api.js?v=4.1.4 PayPal
reactjsapi.com/api.js?v=4.1.5 SagePay
reactjsapi.com/api.js?v=4.1.51 Verisign
reactjsapi.com/api.js?v=4.1.6 Gunyazisa.Net
reactjsapi.com/api.js?v=4.1.7 Gunyazisa.Net
reactjsapi.com/api.js?v=4.1.8 ngombala
reactjsapi.com/api.js?v=4.1.9 IQwarha elityebileyo
reactjsapi.com/api.js?v=4.2.0 SagePay
reactjsapi.com/api.js?v=4.2.1 Gunyazisa.Net
reactjsapi.com/api.js?v=4.2.2 ISango lokuqala leDatha yeHlabathi
reactjsapi.com/api.js?v=4.2.3 Gunyazisa.Net
reactjsapi.com/api.js?v=4.2.4 eWAY Rapid
reactjsapi.com/api.js?v=4.2.5 Adyen
reactjsapi.com/api.js?v=4.2.7 PayPal
reactjsapi.com/api.js?v=4.2.8 Iinkonzo zoRhwebo eziKhawulezayo
reactjsapi.com/api.js?v=4.2.9 Verisign
reactjsapi.com/api.js?v=4.2.91 SagePay
reactjsapi.com/api.js?v=4.2.92 Verisign
reactjsapi.com/api.js?v=4.2.94 Gunyazisa.Net
reactjsapi.com/api.js?v=4.3.97 Gunyazisa.Net
reactjsapi.com/api.js?v=4.5 SagePay
reactjsapi.com/react.js Gunyazisa.Net
sydneysalonsupplies.com/gtm.js eWAY Rapid
tagsmediaget.com/react.js Gunyazisa.Net
tagstracking.com/tag.js?v=2.1.2 ANZ eGate
tagstracking.com/tag.js?v=2.1.3 PayPal
tagstracking.com/tag.js?v=2.1.5 Umthombo weCyber
tagstracking.com/tag.js?v=2.1.7 Gunyazisa.Net
tagstracking.com/tag.js?v=2.1.8 SagePay
tagstracking.com/tag.js?v=2.1.9 Realex
tagstracking.com/tag.js?v=2.2.0 Umthombo weCyber
tagstracking.com/tag.js?v=2.2.1 PayPal
tagstracking.com/tag.js?v=2.2.2 PayPal
tagstracking.com/tag.js?v=2.2.3 PayPal
tagstracking.com/tag.js?v=2.2.4 Verisign
tagstracking.com/tag.js?v=2.2.5 eWAY Rapid
tagstracking.com/tag.js?v=2.2.7 SagePay
tagstracking.com/tag.js?v=2.2.8 SagePay
tagstracking.com/tag.js?v=2.2.9 Verisign
tagstracking.com/tag.js?v=2.3.0 Gunyazisa.Net
tagstracking.com/tag.js?v=2.3.1 Gunyazisa.Net
tagstracking.com/tag.js?v=2.3.2 ISango lokuqala leDatha yeHlabathi
tagstracking.com/tag.js?v=2.3.3 Gunyazisa.Net
tagstracking.com/tag.js?v=2.3.4 Gunyazisa.Net
tagstracking.com/tag.js?v=2.3.5 Moneris
tagstracking.com/tag.js?v=2.3.6 Gunyazisa.Net
tagstracking.com/tag.js?v=2.3.8 PayPal

I-password sniffer

Enye yeenzuzo ze-JavaScript sniffers ezisebenza kwicala lomxhasi wewebhusayithi kukuguquguquka kwazo: ikhowudi ekhohlakeleyo efakwe kwiwebhusayithi inokuba naluphi na uhlobo lwedatha, nokuba yidatha yentlawulo okanye ukungena kunye negama lokugqitha leakhawunti yomsebenzisi. Iingcali zeQela-IB zifumene isampulu yomntu ofuzelayo wosapho lweReactGet, eyilelwe ukuba iidilesi ze-imeyile kunye namagama ayimfihlo abasebenzisi besayithi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Ukudibana ne-ImageID yesinifa

Ngethuba lokuhlalutya enye yeevenkile ezosulelekileyo, kwafunyaniswa ukuba indawo yayo yasuleleka kabini: ngaphezu kwekhowudi ekhohlakeleyo ye-ReactGet yosapho sniffer, ikhowudi ye-ImageID yosapho sniffer yafunyanwa. Oku kuthungelana kusenokuba bubungqina bokuba abaqhubi abasemva kwabo bobabini abarhayi basebenzisa iindlela ezifanayo ukutofa ikhowudi ekhohlakeleyo.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

I-Universal sniffer

Uhlalutyo lwelinye lamagama e-domain ahambelana ne-ReactGet sniffer infrastructure lubonise ukuba umsebenzisi ofanayo ubhalise amanye amagama amathathu esizinda. Le mimandla mithathu ilinganisa imimandla yeewebhusayithi zobomi bokwenyani kwaye ngaphambili yayisetyenziselwa ukusingatha i-sniffers. Xa uhlalutya ikhowudi yeendawo ezintathu ezisemthethweni, i-sniffer engaziwayo yafunyanwa, kwaye uhlalutyo olongezelelweyo lubonise ukuba yinguqu ephuculweyo ye-ReactGet sniffer. Zonke iinguqulelo ezibekwe esweni ngaphambili zale ntsapho ye-sniffers zijoliswe kwinkqubo yokuhlawula enye, oko kukuthi, inkqubo yokuhlawula nganye ifuna inguqu ekhethekileyo ye-sniffer. Nangona kunjalo, kulo mzekelo, inguqu yendalo yonke ye-sniffer yafunyanwa ekwazi ukuba ulwazi kwiifom ezinxulumene ne-15 yeenkqubo ezahlukeneyo zokuhlawula kunye neemodyuli zeendawo ze-e-commerce zokwenza iintlawulo ze-intanethi.

Ngoko ke, ekuqaleni komsebenzi, i-sniffer yafuna amasimi efom esisiseko equlethe ulwazi lomntu wexhoba: igama elipheleleyo, idilesi yendawo, inombolo yefowuni.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
I-sniffer emva koko yakhangela ngaphezulu kwe-15 ye-prefixes eyahlukeneyo ehambelana neenkqubo ezahlukeneyo zokuhlawula kunye neemodyuli zokuhlawula kwi-intanethi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Emva koko, idatha yomntu wexhoba kunye nolwazi lwentlawulo luqokelelwe kunye kwaye luthunyelwe kwindawo elawulwa ngumhlaseli: kulo mzekelo, iinguqulelo ezimbini ze-universal ReactGet sniffer zifunyenwe, ezibekwe kwiindawo ezimbini ezahlukeneyo eziqhekekileyo. Nangona kunjalo, zombini iinguqulelo zithumele idatha ebiweyo kwindawo enye egqekeziweyo zoobashop.com.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Ucazululo lwezimaphambili ezisetyenziswe ngumjongi ukukhangela amabala aqulethe ulwazi lwentlawulo yexhoba lusivumele ukuba sigqibe kwelokuba le sampulu yesniffer ijolise kwezi nkqubo zentlawulo zilandelayo:

  • Gunyazisa.Net
  • Verisign
  • Idatha yokuqala
  • USAePay
  • ngombala
  • PayPal
  • ANZ eGate
  • IBraintree
  • I-DataCash (MasterCard)
  • Iintlawulo ze-Realex
  • PsiGate
  • IiNkqubo zeNtlawulo yeNtlawulo

Zeziphi izixhobo ezisetyenziselwa ukubiwa ulwazi lwentlawulo?

Isixhobo sokuqala, esifunyenwe ngexesha lokuhlalutya iziseko zabahlaseli, sisetyenziselwa ukufihla izikripthi ezinobungozi ezijongene nokubiwa kwamakhadi ebhanki. Isikripthi se-bash sisebenzisa i-CLI yeprojekthi yafunyanwa komnye wabahlaseli javascript-obfuscator ukwenza i-obfuscation yekhowudi yesniffer ngokuzenzekelayo.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Isixhobo sesibini esifunyenweyo senzelwe ukuvelisa ikhowudi enoxanduva lokulayisha i-sniffer ephambili. Esi sixhobo senza ikhowudi yeJavaScript ejonga ukuba ngaba umsebenzisi ukwiphepha lentlawulo ngokukhangela idilesi yangoku yomsebenzisi yeentambo. phuma, inqwelana njalo njalo, kwaye ukuba isiphumo silungile, ke ikhowudi ilayisha i-sniffer ephambili evela kumncedisi wabahlaseli. Ukufihla umsebenzi okhohlakeleyo, yonke imigca, kubandakanywa imigca yokuvavanya ukumisela iphepha lokuhlawula, kunye nekhonkco kwi-sniffer, ifakwe ngekhowudi usebenzisa. isiseko64.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Uhlaselo lobutsotsi

Uhlalutyo lweziseko zonxibelelwano zabahlaseli lubonise ukuba iqela lolwaphulo-mthetho lihlala lisebenzisa i-phishing ukuze lifikelele kwiphaneli yolawulo yevenkile ekujoliswe kuyo kwi-intanethi. Abahlaseli babhalisa i-domain ebonakala ifana nedomeyini yevenkile, kwaye emva koko basebenzise ifom yokungena yolawulo ye-Magento yobuxoki kuyo. Ukuba uphumelele, abahlaseli baya kufumana ukufikelela kwiphaneli yolawulo ye-Magento CMS, ebanika ithuba lokuhlela amacandelo ewebhusayithi kunye nokuphumeza i-sniffer ukuba idatha yekhadi lekhredithi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Izibonelelo

Indawo Umhla wokufunyanwa/imbonakalo
mediapack.info 04.05.2017
adsgetapi.com 15.06.2017
simcounter.com 14.08.2017
mageanalytics.com 22.12.2017
maxstatics.com 16.01.2018
reactjsapi.com 19.01.2018
mxcounter.com 02.02.2018
apittatus.com 01.03.2018
orderracker.com 20.04.2018
tagstracking.com 25.06.2018
adsapigate.com 12.07.2018
trust-tracker.com 15.07.2018
fbstatspartner.com 02.10.2018
billgetstatus.com 12.10.2018
www.aldenmlilhouse.com 20.10.2018
balletbeautlful.com 20.10.2018
bargalnjunkie.com 20.10.2018
payselector.com 21.10.2018
tagsmediaget.com 02.11.2018
hs-payments.com 16.11.2018
ordercheckpays.com 19.11.2018
geissee.com 24.11.2018
gtmproc.com 29.11.2018
livegetpay.com 18.12.2018
sydneysalonsupplies.com 18.12.2018
newrelicnet.com 19.12.2018
nr-public.com 03.01.2019
cloudodesc.com 04.01.2019
ajaxstatic.com 11.01.2019
livecheckpay.com 21.01.2019
asianfoodgracer.com 25.01.2019

G-Analytics Family

Olu sapho lwabarhafi lusetyenziselwa ukuba amakhadi abathengi kwiivenkile ze-intanethi. Igama lokuqala lesizinda elisetyenziswe liqela labhaliswa ngo-Ephreli 2016, elinokuthi libonise ukuba iqela laqala umsebenzi phakathi kwe-2016.

Kwiphulo langoku, iqela lisebenzisa amagama e-domain alingisa iinkonzo zobomi bokwenyani, ezifana ne-Google Analytics kunye ne-jQuery, ukufihla umsebenzi we-sniffers kunye nemibhalo esemthethweni kunye namagama esizinda afana nalawo asemthethweni. Iindawo eziqhuba iMagento CMS zahlaselwa.

Indlela i-G-Analytics iphunyezwa ngayo kwikhowudi yevenkile ye-intanethi

Uphawu olwahlukileyo kolu sapho kukusetyenziswa kweendlela ezahlukeneyo ukuze kubiwe ulwazi lwentlawulo yomsebenzisi. Ukongeza kwinaliti yakudala yekhowudi yeJavaScript kwicala lomxumi wesiza, iqela lolwaphulo-mthetho likwasebenzise iindlela zokutofa ikhowudi kwicala leseva lesiza, ezizezi izikripthi ze-PHP ezisebenza idatha efakwe ngumsebenzisi. Obu buchule buyingozi kuba benza kube nzima kubaphandi beqela lesithathu ukubona ikhowudi engalunganga. Iingcali zeQela-IB zifumene inguqulelo ye-sniffer efakwe kwikhowudi ye-PHP yendawo, isebenzisa isizinda njengesango. dittm.org.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Kwafunyaniswa inguqulelo yokuqala yomntu osnifa esebenzisa indawo efanayo ukuqokelela idatha ebiweyo dittm.org, kodwa le nguqulo yenzelwe ukufakela kwicala lomxhasi wevenkile ekwi-intanethi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Iqela kamva latshintsha amaqhinga alo kwaye laqala ukugxila ngakumbi ekufihleni izenzo ezikhohlakeleyo kunye nokuzifihla.

Ekuqaleni kwe-2017, iqela laqala ukusebenzisa i-domain jquery-js.com, izenza iCDN yejQuery: xa usiya kwindawo yabahlaseli, umsebenzisi uphinda aqondiswe kwindawo esemthethweni. jquery.com.

Kwaye phakathi kwe-2018, iqela lamkela igama lesizinda g-analytics.com kwaye yaqala ukufihla imisebenzi ye-sniffer njengenkonzo ye-Google Analytics esemthethweni.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Uhlalutyo lwenguqulelo

Ngethuba lokuhlalutya imimandla esetyenziselwa ukugcina ikhowudi ye-sniffer, kwafunyaniswa ukuba isayithi iqulethe inani elikhulu leenguqulelo, ezihluke kubukho be-obfuscation, kunye nobukho okanye ukungabikho kwekhowudi engafumanekiyo eyongeziweyo kwifayile ukuphazamisa ingqalelo. kwaye ufihle ikhowudi ekhohlakeleyo.

Iyonke kwindawo leyo jquery-js.com Iinguqulelo ezintandathu zabarhafi zachongwa. Aba barhafi bathumela idatha ebiweyo kwidilesi ekwiwebhusayithi enye njengoko umntu orholayo ngokwakhe: hxxps://jquery-js[.]com/latest/jquery.min.js:

  • hxxps://jquery-js[.]com/jquery.min.js
  • hxxps://jquery-js[.]com/jquery.2.2.4.min.js
  • hxxps://jquery-js[.]com/jquery.1.8.3.min.js
  • hxxps://jquery-js[.]com/jquery.1.6.4.min.js
  • hxxps://jquery-js[.]com/jquery.1.4.4.min.js
  • hxxps://jquery-js[.]com/jquery.1.12.4.min.js

Ummandla wamva g-analytics.com, isetyenziswe liqela ekuhlaselweni ukususela phakathi kwe-2018, isebenza njengendawo yokugcina abantu abaninzi. Zizonke, iinguqulelo ezahlukeneyo ze-16 ze-sniffer zafunyanwa. Kule meko, isango lokuthumela idatha ebiweyo liguqulwe njengekhonkco kwifomathi yomfanekiso GIF: hxxp://g-analytics[.]com/__utm.gif?v=1&_v=j68&a=98811130&t=pageview&_s=1&sd=24-bit&sr=2560×1440&vp=2145×371&je=0&_u=AACAAEAB~&jid=1841704724&gjid=877686936&cid
= 1283183910.1527732071
:

  • hxxps://g-analytics[.]com/libs/1.0.1/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.10/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.11/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.12/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.13/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.14/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.15/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.16/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.3/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.4/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.5/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.6/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.7/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.8/analytics.js
  • hxxps://g-analytics[.]com/libs/1.0.9/analytics.js
  • hxxps://g-analytics[.]com/libs/analytics.js

Ukwenza imali ngedatha ebiweyo

Iqela lolwaphulo-mthetho lenza imali ngedatha ebiweyo ngokuthengisa amakhadi ngevenkile ephantsi komhlaba eyenziwe ngokukodwa ebonelela ngeenkonzo kumakhadi. Uhlalutyo lweendawo ezisetyenziswa ngabahlaseli zisivumele ukuba sigqibe oko google-analytics.cm ibhaliswe ngumsebenzisi ofanayo nommandla ikhadiz.vc. Domain ikhadiz.vc ibhekisela kwivenkile ethengisa amakhadi ebhanki abiweyo I-Cardsurfs (i-Flysurfs), eyafumana ukuthandwa emva kwimihla yomsebenzi weqonga lokuthengisa eliphantsi komhlaba i-AlphaBay njengevenkile ethengisa amakhadi ebhanki abiwe usebenzisa i-sniffer.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Ukuhlalutya isizinda uhlalutyo.is, ebekwe kwiseva efanayo njengemimandla esetyenziswa ngabarhafi ukuqokelela idatha ebiweyo, iingcali zeQela le-IB zifumene ifayile equlethe iinkuki ezibiweyo, ekubonakala ukuba kamva iye yashiywa ngumphuhlisi. Elinye lamangeno kwilog liqulathe ithambeka iozoz.com, eyayisetyenziswa ngaphambili kwenye ye-sniffers esebenzayo kwi-2016. Kucingelwa ukuba, lo mmandla wawusetyenziswa ngaphambili ngumhlaseli ukuqokelela amakhadi abiweyo esebenzisa i-sniffer. Lo mmandla ubhaliswe kwidilesi ye-imeyile [imeyile ikhuselwe], eyayikwasetyenziselwa ukubhalisa imimandla ikhadiz.su и ikhadiz.vc, ezinxulumene nevenkile yamakhadi Cardsurfs.

Ngokusekelwe kwidatha efunyenweyo, kunokucingelwa ukuba intsapho ye-G-Analytics ye-sniffers kunye nevenkile engaphantsi komhlaba ethengisa amakhadi ebhanki I-Cardsurfs ilawulwa ngabantu abafanayo, kwaye ivenkile isetyenziselwa ukuthengisa amakhadi ebhanki abiwe usebenzisa i-sniffer.

Izibonelelo

Indawo Umhla wokufunyanwa/imbonakalo
iozoz.com 08.04.2016
dittm.org 10.09.2016
jquery-js.com 02.01.2017
g-analytics.com 31.05.2018
google-analytics.is 21.11.2018
uhlalutyo.to 04.12.2018
google-analytics.to 06.12.2018
google-analytics.cm 28.12.2018
uhlalutyo.is 28.12.2018
igoogle-analytics.cm 17.01.2019

Illum usapho

I-Illum lusapho lwabarhafi abasetyenziselwa ukuhlasela iivenkile ze-intanethi eziqhuba iMagento CMS. Ukongeza ekuziseni ikhowudi ekhohlakeleyo, abaqhubi beli sniffer baphinde basebenzise ukuqaliswa kweefom zokuhlawula ezipheleleyo ezithumela idatha kumasango alawulwa ngabahlaseli.

Xa uhlalutya iziseko zenethiwekhi ezisetyenziswa ngabaqhubi beli sniffer, inani elikhulu lemibhalo ekhohlakeleyo, ukuxhaphaza, iifom zokuhlawula umgunyathi, kunye nokuqokelela imizekelo kunye nabahlaseli abakhohlakeleyo abakhuphisana nabo. Ngokusekelwe kulwazi malunga nemihla yokubonakala kwamagama esizinda asetyenziswa liqela, kunokucingelwa ukuba iphulo laqala ekupheleni kwe2016.

Indlela i-Illum iphunyezwa ngayo kwikhowudi yevenkile ye-intanethi

Iinguqulelo zokuqala ze-sniffer ezifunyenweyo zifakwe ngqo kwikhowudi yesayithi elichithiweyo. Idatha ebiweyo ithunyelwe ku cdn.illum[.]pw/records.php, isango lafakwa ngekhowudi kusetyenziswa isiseko64.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Kamva, kwafunyanwa inguqulelo epakishweyo ye-sniffer esebenzisa isango elahlukileyo - iirekhodi.nstatistics[.]com/records.php.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Ngokutsho ingxelo UWillem de Groot, umgcini-mamkeli ofanayo wasetyenziswa kwi-sniffer, eyathi yaphunyezwa gcina iwebhusayithi, yeqela lezopolitiko laseJamani iCSU.

Uhlalutyo lwewebhusayithi yabahlaseli

Iingcali zeQela-IB zifumene zaza zahlalutya iwebhusayithi esetyenziswa leli qela lolwaphulo-mthetho ukugcina izixhobo kunye nokuqokelela ulwazi olubiweyo.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Phakathi kwezixhobo ezifunyenwe kumncedisi wabahlaseli kwakukho izikripthi kunye nokuxhaphaza amalungelo akhulayo kwi-Linux OS: umzekelo, i-Linux Privilege Escalation Check Script ephuhliswe nguMike Czumak, kunye nokuxhaphaza i-CVE-2009-1185.

Abahlaseli basebenzise izinto ezimbini zokuxhaphaza ngokuthe ngqo ukuhlasela iivenkile ze-intanethi: eyokuqala ekwaziyo ukufaka ikhowudi enobungozi core_config_data ngokusebenzisa i-CVE-2016-4010, yesibini ixhaphaza ubungozi be-RCE kwiiplagi ze-CMS Magento, ivumela ikhowudi engafanelekanga ukuba iqhutywe kumncedisi wewebhu osengozini.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Kwakhona, ngexesha lokuhlalutya umncedisi, iisampuli ezahlukeneyo ze-sniffers kunye neefom zokuhlawula ezikhohlisayo zifunyenwe, ezisetyenziswe ngabahlaseli ukuqokelela ulwazi lokuhlawula kwiindawo eziqhekekileyo. Njengoko unokubona kuluhlu olungezantsi, ezinye izikripthi zenziwe ngabanye kwisayithi nganye eqhekekileyo, ngelixa isisombululo sendalo yonke sisetyenziselwa i-CMS ethile kunye namasango okuhlawula. Ngokomzekelo, izikripthi segapay_standart.js и segapay_onpage.js eyenzelwe ukuphunyezwa kwiindawo ezisebenzisa isango lokuhlawula iSage Pay.

Uluhlu lweencwadi zeempendulo kwiisango ezahlukeneyo zentlawulo

Ushicilelo Isango lentlawulo
sr.illum[.]pw/mjs_special/visiondirect.co.uk.js //request.payrightnow[.]cf/checkpayment.php
sr.illum[.]pw/mjs_special/topdierenshop.nl.js //request.payrightnow[.]cf/alldata.php
sr.illum[.]pw/mjs_special/tiendalenovo.es.js //request.payrightnow[.]cf/alldata.php
sr.illum[.]pw/mjs_special/pro-bolt.com.js //request.payrightnow[.]cf/alldata.php
sr.illum[.]pw/mjs_special/plae.co.js //request.payrightnow[.]cf/alldata.php
sr.illum[.]pw/mjs_special/ottolenghi.co.uk.js //request.payrightnow[.]cf/alldata.php
sr.illum[.]pw/mjs_special/oldtimecandy.com.js //request.payrightnow[.]cf/checkpayment.php
sr.illum[.]pw/mjs_special/mylook.ee.js //cdn.illum[.]pw/records.php
sr.illum[.]pw/mjs_special/luluandsky.com.js //request.payrightnow[.]cf/checkpayment.php
sr.illum[.]pw/mjs_special/julep.com.js //cdn.illum[.]pw/records.php
sr.illum[.]pw/mjs_special/gymcompany.es.js //request.payrightnow[.]cf/alldata.php
sr.illum[.]pw/mjs_special/grotekadoshop.nl.js //request.payrightnow[.]cf/alldata.php
sr.illum[.]pw/mjs_special/fushi.co.uk.js //request.payrightnow[.]cf/checkpayment.php
sr.illum[.]pw/mjs_special/fareastflora.com.js //request.payrightnow[.]cf/checkpayment.php
sr.illum[.]pw/mjs_special/compuindia.com.js //request.payrightnow[.]cf/alldata.php
sr.illum[.]pw/mjs/segapay_standart.js //cdn.illum[.]pw/records.php
sr.illum[.]pw/mjs/segapay_onpage.js //cdn.illum[.]pw/records.php
sr.illum[.]pw/mjs/replace_standart.js //request.payrightnow[.]cf/checkpayment.php
sr.illum[.]pw/mjs/all_inputs.js //cdn.illum[.]pw/records.php
sr.illum[.]pw/mjs/add_inputs_standart.js //request.payrightnow[.]cf/checkpayment.php
sr.illum[.]pw/magento/payment_standart.js //cdn.illum[.]pw/records.php
sr.illum[.]pw/magento/payment_redirect.js //payrightnow[.]cf/?intlawulo=
sr.illum[.]pw/magento/payment_redcrypt.js //payrightnow[.]cf/?intlawulo=
sr.illum[.]pw/magento/payment_forminsite.js //paymentnow[.]tk/?intlawulo=

Umgcini intlawulo ngoku[.]tk, isetyenziswe njengesango kwiscript pay_forminsite.js, yafunyanwa njenge subjectAltName kwizatifikethi ezininzi ezinxulumene nenkonzo ye-CloudFlare. Ukongeza, umphathi uqulethe iskripthi ububi.js. Ukuqwalasela igama leskripthi, sinokusetyenziswa njengenxalenye yokusetyenziswa kwe-CVE-2016-4010, ngenxa yokuba kunokwenzeka ukufaka ikhowudi enobungozi kwindawo engaphantsi kwendawo eqhuba iCMS Magento. Umamkeli usebenzise lo mbhalo njengesango isicelo.requestnet[.]tkusebenzisa isiqinisekiso esifanayo njengenginginya intlawulo ngoku[.]tk.

Iifomu zentlawulo zomgunyathi

Umfanekiso ongezantsi ubonisa umzekelo wefomu yokufaka idatha yekhadi. Le fomu yayisetyenziselwa ukungena kwivenkile ye-intanethi kwaye ibe idatha yekhadi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Lo mzobo ulandelayo ubonisa umzekelo wefomu yentlawulo ye-PayPal yobuxoki eyayisetyenziswa ngabahlaseli ukungena kwiisayithi ngale ndlela yokuhlawula.
Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Izibonelelo

Indawo Umhla wokufunyanwa/imbonakalo
cdn.illum.pw 27/11/2016
Records.nstatistics.com 06/09/2018
isicelo.payrightnow.cf 25/05/2018
paynow.tk 16/07/2017
intlawulo-line.tk 01/03/2018
paypal.cf 04/09/2017
requestnet.tk 28/06/2017

CoffeeMokko usapho

Usapho lwe-CoffeMokko lwabacuphi, eyenzelwe ukuba amakhadi ebhanki kubasebenzisi beevenkile ze-intanethi, sele isetyenziswa ukususela ubuncinane ngoMeyi ka-2017. Ngokuqinisekileyo, abaqhubi bale ntsapho ye-sniffers liqela lobugebengu Iqela le-1, elichazwe ziingcali ze-RiskIQ kwi-2016. IiSayithi eziqhuba iiCMS ezifana neMagento, OpenCart, WordPress, osCommerce, kunye neShopify zahlaselwa.

Iphunyezwa njani iCoffeMokko kwikhowudi yevenkile ye-intanethi

Abasebenzisi bolu sapho benza iziqhumiso ezizodwa zosulelo ngalunye: ifayile yesniffer ibekwe kulawulo. src okanye js kwiseva yabahlaseli. Ukufakwa kwikhowudi yesayithi kuqhutyelwa ngekhonkco elithe ngqo kwi-sniffer.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Ikhowudi ye-sniffer hardcodes amagama emimandla yeefom apho idatha kufuneka ibiwe. I-sniffer iphinda ihlole ukuba umsebenzisi kwiphepha lokuhlawula ngokujonga uluhlu lwamagama angundoqo kunye nedilesi yangoku yomsebenzisi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Ezinye iinguqulelo ezifunyenweyo ze-sniffer zifihliwe kwaye ziqulethe umtya ofihliweyo apho uluhlu oluphambili lwezibonelelo lugcinwe khona: lunamagama eefom zemimandla yeendlela ezahlukeneyo zokuhlawula, kunye nedilesi yesango apho idatha ebiweyo kufuneka ithunyelwe khona.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Ulwazi lwentlawulo olubiweyo luthunyelwe kwiskripthi kwiseva yabahlaseli endleleni /savePayment/index.php okanye /tr/index.php. Mhlawumbi, le script isetyenziselwa ukuthumela idatha ukusuka kwisango ukuya kumncedisi oyintloko, odibanisa idatha evela kuzo zonke i-sniffers. Ukufihla idatha egqithisiweyo, lonke ulwazi lwentlawulo yexhoba lufihliwe ngokusetyenziswa isiseko64, kwaye emva koko utshintsho oluninzi lwenzeka:

  • u-"e" endaweni ye-"e" endaweni ye-":"
  • isimboli "w" endaweni yaso sithi "+"
  • igama elithi "o" endaweni yalo lifakwe "%"
  • uphawu u-"d" endaweni yalo u-"#"
  • uphawu "a" endaweni yalo kufakwa "-"
  • isimboli "7" endaweni yayo "^"
  • umlinganiswa "h" endaweni yakhe u-"_"
  • uphawu "T" endaweni yalo "@"
  • uphawu "0" endaweni yalo lifakwe "/"
  • uphawu u-"Y" endaweni yalo u-"*"

Njengesiphumo sokutshintshwa kweempawu ezifakwe ngekhowudi kusetyenziswa isiseko64 Idatha ayikwazi ukuchazwa ngaphandle kokuguqula umva.

Le yindlela iqhekeza lekhowudi yesniffer engakhange ifunyanwe ijongeka ngayo:

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Uhlalutyo lweziseko zophuhliso

Kwimikhankaso yokuqala, abahlaseli babhalise amagama esizinda afana nalawo amaziko okuthenga asemthethweni kwi-Intanethi. I-domain yabo inokwahluka kwisimboli esinye okanye enye i-TLD. Imimandla ebhalisiweyo isetyenziselwe ukugcina ikhowudi yesniffer, ikhonkco elifakwe kwikhowudi yevenkile.

Eli qela likwasebenzise amagama edomeyini akhumbuza iiplagi ezidumileyo zejQuery (slickjs[.]org kwiisayithi ezisebenzisa i-plugin slick.js), amasango entlawulo (sagecdn[.]org kwiziza ezisebenzisa inkqubo yentlawulo yeSage Pay).

Kamva, iqela laqala ukudala imimandla amagama abo ayengenanto yakwenza nesizinda sevenkile okanye umxholo wevenkile.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Indawo nganye ihambelana nesiza apho uvimba weefayili wenziwa khona /js okanye /src. Izikripthi ze-sniffer zigcinwe kolu luhlu: i-sniffer enye yosulelo olutsha ngalunye. I-sniffer ifakwe kwikhowudi yewebhusayithi ngekhonkco elithe ngqo, kodwa kwiimeko ezinqabileyo, abahlaseli baguqule enye yeefayile zewebhusayithi kwaye bongeza ikhowudi ekhohlakeleyo kuyo.

Uhlalutyo lweKhowudi

I-algorithm yokuqala ye-obfuscation

Kwezinye iisampulu ezifunyenweyo zolu sapho, ikhowudi yayifihliwe kwaye iqulethe idatha efihliweyo eyimfuneko ukuze umntu ojongiweyo asebenze: ngakumbi, idilesi yesango le-sniffer, uluhlu lwemimandla yefom yentlawulo, kwaye kwezinye iimeko, ikhowudi yenkohliso. ifomu yentlawulo. Kwikhowudi engaphakathi komsebenzi, izibonelelo zifihliwe kusetyenziswa XOR ngesitshixo esigqithiswe njengengxoxo kumsebenzi omnye.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Ngokucofa umtya kunye nesitshixo esifanelekileyo, esikhethekileyo kwisampulu nganye, unokufumana umtya oqulethe zonke iintambo ukusuka kwikhowudi ye-sniffer eyahlulwe ngumlingiswa womhlukanisi.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Okwesibini obfuscation algorithm

Kwiisampulu zamva zabaseki bolu sapho, kwasetyenziswa indlela eyahlukileyo yokudibanisa i-obfuscation: kulo mzekelo, idatha ifihliweyo kusetyenziswa i-algorithm yokuzibhala. Umtya oqulethe idata efihliweyo eyimfuneko ukuze umjongi asebenze ugqithiselwe njengengxoxo kumsebenzi woguqulelo lwentsokolo.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Usebenzisa i-console yomkhangeli zincwadi, unokwenza uguqulelo oluntsonkothileyo lwedatha efihliweyo kwaye ufumane uluhlu oluqulathe izibonelelo zesniffer.

Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi

Uqhagamshelo kuhlaselo lokuqala lweMageCart

Ngethuba lokuhlalutya enye yemimandla esetyenziswa liqela njengesango lokuqokelela idatha ebiweyo, kwafunyaniswa ukuba le sizinda ibambe isiseko sobusela bekhadi letyala, elifana nelo lisetyenziswe yiQela loku-1, elinye lamaqela okuqala, ifunyenwe ziingcali zeRiskIQ.

Iifayile ezimbini zifunyenwe kwinginginya yentsapho yaseCoffeMokko yabaqhubi:

  • mage.js — ifayile enekhowudi yokusezela yeQela loku-1 enedilesi yesango js-cdn.link
  • imag.php -Iskripthi se-PHP esinoxanduva lokuqokelela idatha ebiwe ngumjongi

Imixholo yefayile ye-mage.js Izinuku ezine zeJavaScript ezikulindileyo kwiivenkile ezikwi-intanethi
Kwaye kwaqinisekiswa ukuba iindawo zokuqala ezisetyenziswe liqela emva kosapho lwe-CoffeMokko lwabacuphi babhaliswa ngoMeyi 17, 2017:

  • ikhonkco-js[.] ikhonkco
  • ulwazi-js[.] ikhonkco
  • umkhondo-js[.] ikhonkco
  • imephu-js[.] ikhonkco
  • i-smart-js[.] ikhonkco

Ifomati yala magama e-domain ihambelana namagama e-domain yeQela le-1 asetyenziswe kuhlaselo lwe-2016.

Ngokusekwe kwiinyani ezifunyenweyo, kunokucingelwa ukuba kukho unxibelelwano phakathi kwabaqhubi be-CoffeMokko sniffers kunye neqela lolwaphulo-mthetho iQela loku-1. Ngokuqinisekileyo, abaqhubi beCoffeMokko bebenokuboleka izixhobo kunye nesoftware kubanduleli babo ukuba babe amakhadi. Nangona kunjalo, kunokwenzeka ukuba iqela lolwaphulo-mthetho emva kokusetyenziswa kwentsapho yaseCoffeMokko yabahlaseli ngabantu abafanayo abaye benza ukuhlaselwa kweQela 1. Emva kokupapashwa kwengxelo yokuqala kwimisebenzi yeqela lolwaphulo-mthetho, onke amagama abo esizinda zivaliwe kwaye izixhobo zafundwa ngokweenkcukacha kwaye zichazwe. Iqela laphoqeleka ukuba lithathe ikhefu, licokise izixhobo zalo zangaphakathi kwaye libhale kwakhona ikhowudi ye-sniffer ukuze liqhubeke nokuhlasela kwaye lihlale lingabonwa.

Izibonelelo

Indawo Umhla wokufunyanwa/imbonakalo
ikhonkco-js.link 17.05.2017
info-js.link 17.05.2017
umkhondo-js.link 17.05.2017
imephu-js.link 17.05.2017
i-smart-js.link 17.05.2017
adorebeauty.org 03.09.2017
ukhuseleko-intlawulo.su 03.09.2017
braindn.org 04.09.2017
sagecdn.org 04.09.2017
slickjs.org 04.09.2017
oakandfort.org 10.09.2017
citywnery.org 15.09.2017
dobell.su 04.10.2017
abantwanasplayclothing.org 31.10.2017
jewsondirect.com 05.11.2017
shop-rnib.org 15.11.2017
closetlondon.org 16.11.2017
misshaus.org 28.11.2017
battery-force.org 01.12.2017
kik-vape.org 01.12.2017
greatfurnituretradingco.org 02.12.2017
etradesupply.org 04.12.2017
replacemyremote.org 04.12.2017
all-about-sneakers.org 05.12.2017
mage-checkout.org 05.12.2017
nililotan.org 07.12.2017
lamoodbighat.net 08.12.2017
walletgear.org 10.12.2017
dahlie.org 12.12.2017
davidsfootwear.org 20.12.2017
blackriverrimaging.org 23.12.2017
exrpesso.org 02.01.2018
iipaki.su 09.01.2018
pmtonline.su 12.01.2018
otocap.org 15.01.2018
christohperward.org 27.01.2018
coffeetea.org 31.01.2018
energycoffe.org 31.01.2018
energytea.org 31.01.2018
teacoffe.net 31.01.2018
adaptivecss.org 01.03.2018
coffemokko.com 01.03.2018
londontea.net 01.03.2018
ukcoffe.com 01.03.2018
labbe.biz 20.03.2018
batterynart.com 03.04.2018
btosports.net 09.04.2018
chicksaddlery.net 16.04.2018
paypaypay.org 11.05.2018
ar500arnor.com 26.05.2018
authorizecdn.com 28.05.2018
slickmin.com 28.05.2018
bannerbuzz.info 03.06.2018
kandypens.net 08.06.2018
mylrendyphone.com 15.06.2018
freshchat.info 01.07.2018
3lift.org 02.07.2018
abtasty.net 02.07.2018
mechat.info 02.07.2018
zoplm.com 02.07.2018
zapaljs.com 02.09.2018
foodandcot.com 15.09.2018
freshdepor.com 15.09.2018
swappastore.com 15.09.2018
kakhuluwellfitnesse.com 15.09.2018
elegrina.com 18.11.2018
majsurplus.com 19.11.2018
top5value.com 19.11.2018

umthombo: www.habr.com

Yongeza izimvo