Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Network Security, Threat Management, Threat Management, Malware, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Hotel websites infected with skimmer via supply chain attack

Share

A Magecart card-skimming campaign this month sabotaged the mobile websites of two hotel chains by executing a supply chain attack on a third-party partner, researchers have reported.

The third party in both instances was Roomleader, a Barcelona-based provider of digital marketing and web development services. One of the ways Roomleader helps hospitality companies build out their online booking functionality is through a library module called "viewedHotels," which saves viewed hotel information in visitors' browser cookies.

Both of the affected hotel chains implemented this module, which the adversaries had infected with malicious JavaScript after first compromising Roomleader, according to Trend Micro, whose researchers discovered the attacks and disclosed them in a company blog post today. The lodging chains were not named, but one has 107 hotels in 14 countries and the other has 73 hotels in 14 countries.

As is typical with Magecart attacks, the skimmer was designed to steal data from payment forms, including credit card details, names, email addresses, telephone numbers and hotel room preferences. This information is doubly encrypted and exfiltrated to the attackers, who can then decrypt and view it.

Although the skimmer code is capable of swiping data from both PC and mobile browsers, the Magecart actors specifically programmed the malware to only deliver the skimmer to mobile users. Desktop users, on the other hand, received normal JavaScript copied from a GitHub, "likely because the threat actor behind it wants to avoid detection from PC-based security software," explained Trend Micro fraud researcher Joseph Chen in the blog post.

Interestingly, the skimmer was also programmed to replace mobile websites' normal payment forms with a slightly different version created by the attackers. The attackers even went as far as to translate the fraudulent forms into eight different languages, to match the various languages supported by the targeted hotel websites.

Trend Micro offered a reason for this: Certain hotel booking forms don't ask for Card Verification Code (CVC) numbers in advance because the customer can simply pay upon arriving at the hotel. This doesn't help the attackers, so they created a replacement form that asks for these security numbers.

There is also a second possible motive: "...Sometimes, the booking page will host the credit card form in a different domain using an HTML iframe element to make it more secure," Chen wrote. "In this scenario, a regular JavaScript skimmer will not be able to copy the data inside the secure iframe. Therefore, the attacker removes the iframe of the secured credit card form and injects his own form so the skimmer can copy the information."

SC Media has reached out to Roomleader for comment.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.
Bradley Barth

As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.