Magecart Hackers Target U.S. Cities Using Click2Gov
Magecart web skimmers were found on the websites of eight cities in the United States and one thing they have in common is that they all use the Click2Gov platform, Trend Micro reports.
Designed for community engagement, reporting of issues, and online payments, the Click2Gov web-based platform is used by local governments across the United States and has been the victim of financially-motivated threat actors in both 2018 and 2019.
The new wave of attacks, however, does not appear to be related to previous incidents, at least not from a technical point of view, Trend Micro’s security researchers say. They also revealed that seven of the impacted cities were targeted in previous incidents.
The skimming code, which was designed specifically to target Click2Gov payment forms, is triggered when the victim makes an online payment on the compromised website.
Data targeted by the code includes credit card number, CVV number, expiration date, and card holder’s name, address, and ZIP code area. An HTTP POST request is used to send the collected information to a remote sever.
“One of the servers was used for three sites, while the other server used for the remaining five sites. The two skimmers used are identical, save for the change in the hostname of the exfiltration servers,” Trend Micro fraud researcher Joseph C. Chen explains.
Of the eight impacted cities, seven were involved in previous attacks: five in the 2018 campaign and two in the 2019 incident, but it’s unclear whether there’s a connection with the newly identified breaches.
“Credit card skimming attacks are still a major threat to online merchants. Victims not limited to only typical e-commerce sites. During 2019, we also saw that academic institutions and hotel chains were targeted by similar attacks. This time, the attacker targeted the websites of various local governments. This shows the importance of keeping payment portals secure to protect both an organization and its customers,” Trend Micro concludes.