SOURCE DEFENSE RESEARCH INTELLIGENCE NEWSApril 22, 2025 |
MULTIPLE WEBSITES BREACHED THROUGH COMPROMISED HOSTING SERVICEA new attack has been disclosed, hidden within a known and trusted source—effectively bypassing solutions that rely on Content Security Policy (CSP), where such sources are typically whitelisted. The Source Defense Research Team has uncovered another sophisticated breach affecting numerous websites, including UK-based restaurant websites using a popular online food ordering platform. In this case, malicious scripts were loaded from CodePen’s Asset Hosting service, complicating detection—especially for security strategies that rely on whitelisting. This remains true even when a WebSocket is established to communicate with a known malicious domain. Furthermore, the stolen data is transmitted via WebSockets—a method that has gained popularity over the past year and may be overlooked due to its relatively recent emergence.
This type of attack is known as a silent skimming attack because the infiltration occurs as the user enters sensitive details into a legitimate payment form, and it typically goes completely unnoticed by users.
Our team immediately alerted CodePen, and they responded quickly to remove the malicious content.
This incident serves as a crucial reminder that comprehensive protection against such attacks requires solutions that consistently monitor scripts, whether newly introduced or exhibiting suspicious behavior. Additionally, it's essential to monitor data transfers via WebSockets to ensure their legitimacy.
|
Any questions? Contact us at: support@sourcedefense.com For the latest cyber research news, follow us at https://x.com/sdcyberresearch |
|
|