Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Google The Internet

Crooks Abuse Google Analytics To Conceal Theft of Payment Card Data (arstechnica.com) 10

An anonymous reader quotes a report from Ars Technica: Hackers are abusing Google Analytics so that they can more covertly siphon stolen credit card data out of infected ecommerce sites, researchers reported on Monday. Payment card skimming used to refer solely to the practice of infecting point-of-sale machines in brick-and-mortar stores. The malware would extract credit card numbers and other data. Attackers would then use or sell the stolen information so it could be used in payment card fraud. One challenge in pulling off the hack is bypassing website security policies or concealing the exfiltration of massive amounts of sensitive data from endpoint security applications installed on the infected network. Researchers from Kaspersky Lab on Monday said that they have recently observed about two dozen infected sites that found a novel way to achieve this. Instead of sending it to attacker-controlled servers, the attackers send it to Google Analytics accounts they control. Since the Google service is so widely used, ecommerce site security policies generally fully trust it to receive data.

"Google Analytics is an extremely popular service (used on more than 29 million sites, according to BuiltWith) and is blindly trusted by users," Kaspersky Lab researcher Victoria Vlasova wrote here. "Administrators write *.google-analytics.com into the Content-Security-Policy header (used for listing resources from which third-party code can be downloaded), allowing the service to collect data. What's more, the attack can be implemented without downloading code from external sources." The researcher added: "To harvest data about visitors using Google Analytics, the site owner must configure the tracking parameters in their account on analytics.google.com, get the tracking ID (trackingId, a string like this: UA-XXXX-Y), and insert it into the web pages together with the tracking code (a special snippet of code). Several tracking codes can rub shoulders on one site, sending data about visitors to different Analytics accounts." The "UA-XXXX-Y" refers to the tracking ID that Google Analytics uses to tell one account from another. As demonstrated in the following screenshot, showing malicious code on an infected site, the IDs (underlined) can easily blend in with legitimate code.

This discussion has been archived. No new comments can be posted.

Crooks Abuse Google Analytics To Conceal Theft of Payment Card Data

Comments Filter:
  • "Google Analytics is an extremely popular service (used on more than 29 million sites, according to BuiltWith) and is blindly trusted by users," Kaspersky Lab researcher Victoria Vlasova

    Google Analytics is only popular with website operators, and it's certainly not "blindly trusted by users": those technically enclined enough to be aware of what it is block it, and those who aren't aren't even aware they're being tracked.

    • I have always blocked google-analytics.com using my hosts file and I have never encountered an issue with a web page not rendering properly because of it.

    • by EvilSS ( 557649 )
      The website operators ARE the Google Analytics users, not the people visiting the website.
  • I am afraid that this is just half of the story. The attackers must be able to inject their code into the website, even if there is a Content Security Policy active. If the CSP is not active, they might as well send the data to their own server.

    I am curious how they inject their code in the first place.

Avoid strange women and temporary variables.

Working...