Jump to content
OpenSecurity.global
  • Recently Browsing   0 members

    No registered users viewing this page.

  • 0
Sign in to follow this  
Dan Miles

Open Source MageCart IOCs

Question

Heyo,

I'm looking to get my hands on any known good open sources / repos  / pastebins of MageCart IOCs that are out there?

Share this post


Link to post

1 answer to this question

Recommended Posts

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

  • Members online now

    No members to show

  • Similar Content

    • By Salaheldin A.
      OSINT Tools collections:
      Verification Toolset : https://start.me/p/ZGAzN7/verification-toolset
      Mapping & Monitoring : https://start.me/p/7k4BnY/mapping-monitoring
      Tools: https://start.me/p/Wrrzk0/tools
      Search Engines:  https://start.me/p/b56G5Q/search-engines
      Social Media Dashboard : https://start.me/p/m6MbeM/social-media-intelligence-dashboard
      Threat Intel, OSINT and malware investigation resources : https://start.me/p/rxRbpo/ti
      AML Toolbox : https://start.me/p/rxeRqr/aml-toolbox
      Technisette collection  : https://start.me/p/wMdQMQ/tools
      Ph055a collection  : https://github.com/Ph055a/OSINT-Collection
    • By Tim Casey
      You may have heard research from IBM's X-Force ISIS on Magecart's attacks on "commercial-grade layer 7 (L7) routers .... typically used by airports, casinos, hotels and resorts, to name a few." (https://securityintelligence.com/posts/leading-magecart-group-targeting-captive-wi-fi-users-via-l7-routers/)
      I have a CCNA and never heard of "commercial grade" routers, so thought I would look for some.
      The closest product I came up with in my search was Cisco's Meraki. https://meraki.cisco.com/solutions/hospitality. BTW, has a bluetooth low engergy beacon traffic tracking, which has some privacy implications. "How long did guests spend at the lobby bar this past week, and how many spent over an hour at the hotel restaurant last Thursday?" Wow. And Login into Wifi with Facebook. What could go wrong. Anyway it has an API, maybe this is what MG5 is attacking: https://meraki.cisco.com/solutions/location_analytics. This link has a few sub links with access to more detailed information.
      Anyway, usually when we hear about Layer7 is tracking app use on a network or load balancing. Many Cisco products have this feature. But I don't think that is what X-Force is talking about. 
      It would nice if IBM would release more information, if you want the report you have to enter your business info (there is a link at the bottom of the first link above).
    • By Rami Shaath
      Source: https://www.welivesecurity.com/2019/09/09/backdoor-stealth-falcon-group/
      Interesting... some overlap and use of RU infrastructure.. 
      Curious, has anyone found the SHA256 eqv of the SHA-1 (Yea.. I know) mentioned in the article?  Just hashes would suffice. 
    • By Rami Shaath
      DISCLAIMER - I don't work for, or endorse  this job posting.  However, I know the CISO well and is on a look out for awesome talent to build unique services in the region. 
      if you are interested, reach out to him directly. (see below)  
       
       
      https://www.linkedin.com/posts/hussain-alkhalsan-ciso-65ab76a_ladies-gentlemen-if-you-are-an-information-activity-6565933167730098176-smFd
×
×
  • Create New...

Important Information

We use cookies as we're cookie monsters. Privacy Policy