Hackers are collecting payment details, user passwords from 4,600 sites

May 12, 2019

Same hacker group compromises Alpaca Forms and Picreel to deploy malicious code to thousands of sites.

Both hacks have been spotted by Sanguine Security founder Willem de Groot earlier today and confirmed by several other security researchers.

Picreel is an analytics service that allows site owners to record what users are doing and how they’re interacting with a website to analyze behavioral patterns and boost conversation rates. Picreel customers –website owners– are supposed to embed a piece of JavaScript code on their sites to allow Picreel to do its job. It’s this script that hackers have compromised to add malicious code.

Alpaca Forms is an open-source project for building web forms. It was initially developed by the enterprise CMS provider Cloud CMS and open-sourced eight years ago. Cloud CMS still provides a free CDN (content delivery network) service for the project. Hackers appear to have breached this Cloud CMS-managed CDN and modified one of the Alpaca Form scripts.

The malicious code embedded in the Picreel script has been seen on 1,249 websites, while the Alpaca Forms one has been seen on 3,435 domains.

Cloud CMS has intervened and taken down the CDN that was serving the tainted Alpaca Forms script. The company is now investigating the incident and clarified “there has been no security breach or security issue with Cloud CMS, its customers or its products.” Currently, there is no evidence to suggest this, unless Cloud CMS customers used the Alpaca Forms script for their sites on their own.

SUPPLY-CHAIN ATTACKS, A GROWING THREAT FOR WEBSITES

In the past two years, attacks like these ones have become quite common. Known as supply-chain attacks, hackers groups have realized that breaching high-profile websites isn’t as simple as it sounds, and they’ve started targeting smaller businesses that provide “secondary code” to these websites, and thousand others.

They targeted providers of chat widgets, live support widgets, analytics companies, and more.

Motivations vary depending on the group. For example, some groups have hacked third-party companies to deploy cryptojacking scripts, while others have used the same technique to deploy specialized code that steals only data entered in payment forms.

Today’s attack is different because it is quite generic, targeting every form field on a website, regardless of purpose.

Related Articles

EHR Vendor Slapped With HIPAA Fine

EHR Vendor Slapped With HIPAA FineInvestigation Came in Wake of Cyberattack That Affected Millions Federal regulators have smacked a cloud-based electronics health records vendor with a $100,000 HIPAA settlement in the wake of a 2015 cyberattack that affected millions...

‘BlueKeep’ Windows Remote Desktop flaw gets PoC exploits

‘BlueKeep’ Windows Remote Desktop flaw gets PoC exploitsMultiple researchers created proof-of-concept exploits, including remote code execution attacks, targeting the recently patched Windows Remote Desktop flaw called BlueKeep. Microsoft patched a...

Database with millions of Instagram influencers’ info leaked online

Database with millions of Instagram influencers’ info leaked onlineThe leaked database was discovered on Shodan on May 14th. A huge online database containing private contact information including phone numbers and email IDs of roughly 50 million Instagram profiles...

Stay Up to Date With The Latest News & Updates

Join Our Newsletter

Get weekly tech updates and immediate alerts when there is a zero-day or security issue!

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Share This