Our recent comprehensive report features an in-depth analysis of JS-sniffers' darknet market, their entire infrastructure and the monetization methods. Group-IB researchers have discovered 38 families of JS-sniffers, whereas only 12 were known previously.
Last time we analyzed ReactGet family, and this blog post focuses on G-Analytics family of JS-sniffers. We discovered that the stolen payment cards data is sold through an underground store specially created for this purpose.
The first known domain name used by the group behind this family of JS-sniffers was registered in April 2016, which may indicate that the group started its activities in the middle of 2016. This family's most distinctive feature is the ability to steal payment information using multiple methods.
As part of the current campaign, the attackers use domain names that imitate the legitimate services such as Google Analytics and jQuery and disguise the JS-sniffer's malicious activity with legitimate scripts and domain names that resemble the legitimate ones. The infection campaign, involving the use of G-Analytics JS-sniffers, targeted e-commerce websites running on the CMS Magento.
One of the domains associated with the G-Analytics JS-sniffers family, dittm.org, was used in the earliest attacks by the group behind this JS-Sniffer. Another characteristic of the group that uses the G-Analytics JS-sniffers family is the ability to inject malicious code into not only the website's HTML code but also to the server-side PHP scripts that handles payments on e-commerce websites. This technique is more dangerous than injecting malicious code into the client-side scripts because such infections are more difficult to detect for security analysts.
Moreover, an early version of the client-side JS-sniffer was found, which also uses the same domain (dittm.org) name as the gate.
The group later changed their tactics and paid more attention to hiding and disguising malicious activity.
In early 2017, the group started using the domain name jquery-js.com as a gate. This domain name imitates the legitimate one of jQuery's CDN. The fake website redirects users to the legitimate website jquery.com.
In the middle of 2018, the group started to use the domain name g-analytics.com and disguised the JS-sniffer's activity as a legitimate Google Analytics service.
Analysis of versions
While analysing domain names used for storing JS-sniffer's source code, we discovered that these hosts stored multiple different versions of the JS-sniffer. Differences between these versions include the presence of unreachable code and obfuscation algorithms that hide the malicious code within the legitimate one.
Six different samples of G-Analytics JS-sniffers were found on the website jquery-js.com. These JS-sniffers sent stolen data to the URL address on the same host, hxxps://jquery-js[.]com/latest/jquery.min.js:
The analysis of domains, used by the attackers, helped to establish that both domains google-analytics.cm and cardz.vc were registered by the same user. The domain cardz.vc is associated with an underground shop that sells stolen cards Cardsurfs (Flysurfs), which became popular as a store that sells payment cards stolen by the JS-sniffers, when darknet marketplace AlphaBay was active.
By analyzing the domain analytic.is, located on the same server with the domains used by the JS-sniffers for collecting the stolen data, Group-IB researchers discovered the file that contained the logs of Cookie Stealer, which seemed to be abandoned by its developer. One of the log entries contained the domain iozoz.com, which was used earlier by one of the JS-sniffers, active back in 2016. Supposedly, this domain was previously used by a cybercriminal for payment card info collection, stolen by the JS-sniffer. The domain was registered by a person with the email address email@example.com, which was also used to register cardz.su and cardz.vc domains connected with Cardsurfs cardshop.
Based on the obtained data, it can be assumed that the G-Analytics JS-sniffers family and Cardsurfs underground cardshop are managed by the same people, and the shop is used to sell payment cards stolen by the JS-sniffer.
Crime without punishment: in-depth analysis of JS-sniffers
JS-sniffers pose a growing threat by attacking online stores and stealing payment data and credentials of their users. When a website is infected with JS-sniffer, everyone is a victim – online shoppers, ecommerce websites, payment processing systems, and banks that issued compromised cards. Group-IB experts have researched this type of malware and have discovered 38 families of JS-sniffers, whereas only 12 were known previously.