The security firms Malwarebytes and HYAS have strung together several pieces of evidence that they believe tie Magecart Group 4 to the Cobalt Group.
The two companies found that the Cobalt Group and Magecart Group 4 have several overarching similarities, such as the use of advanced techniques during their attacks and a history with banking malware. Additionally, the research firms found some underlying stylistic parallels that serve as circumstantial evidence that the two are the same entity.
Malwarebytes found connections between email registrants and exfiltration gates. For example, the client-side and server-side skimmer domains bootstraproxy[.]com and s3-us-west[.]com are registered to [email protected] and are listed by RiskIQ as being used by Magecart Group 4 in its report Group 4: Never gone, simply advancing IOCS.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.