Sesame Street store hacked with Java cookie

Credit card info is being trafficked to another site via a rogue Google Cloud storage domain name, according to a researcher

The Cookie Monster

Sesame Street's online store has been targeted by a credit card stealing hack, according to a security researcher.

Customers card details were collected by a piece of malicious code, dubbed "JavaScript Cookie", which was embedded into shopping cart software built by Volusion.

Some 20,000 small business customers use Volusion, an e-commerce software firm, but its service has been allegedly hacked via a Google Cloud storage domain name.

Marcel Afrahim, a researcher at security firm Check Point, spotted the problem while shopping for Sesame Street merchandise. What's more, he believes this isn't the only site to have the same malicious code embedded.

"The compromise is not only unique to Sesame Street Store and most likely any e-commerce website hosted on Volusion is probably running malicious code and posting the credit card info of the consumers to the outsider domain," he wrote.

IT Pro has contacted Volusion for comment but has yet to receive a reply. The Sesame Street live store was down at the time of writing, with customers receiving this message: "Thank you for visiting our site! Unfortunately, our store is currently closed. We will be back online to serve you soon. Thank you for your patients."

Sesame Street's online store is built with Volusion's all-in-one e-commerce website builder. According to Afrahim, the checkout is on a single page where all the info is entered and validated before taking the user to the confirmation page.

Afrahim noticed that while all the resources were loading from the Sesame Street and Volusion websites, an odd JavaScript file began loading from a Google Cloud storage domain name. The file name was "volusionapi" and according to Afrahim, anyone can sign up and chose a unique bucket name and serve content with Google Cloud.

"Google Cloud Storage (and other Cloud storage providers) has been abused before where threat actors or malware authors distribute malicious code or actual malware through these legitimate services," he wrote.

The malicious code, in this case, looks like a simple lightweight JavaScript API for dealing with cookies copied from GitHub, but is actually a complex script for sending credit card info to another site.

"At its core, the additional code consists of two sections," Afrahim explained. "The first section is reading the values entered at the Credit Card information fields and after a series of checks, it's Base64 encoded along with serialisation and simple shift operation, so that a simple Base64 deobfuscation would not reveal the data.

"The data is then stored using the browser's sessionStorage with the name '__utmz_opt_in_out'. sessionStorage is similar to localStorage; the difference is that while data in localStorage doesn't expire, data in sessionStorage is cleared when the page session ends."

To the untrained eye, it doesn't look suspicious, according to Afrahim. He even suggests that most analysts would see it as legitimate analytics and web trafficking. He believes that the actors behind the scam went through some lengthy steps to make the traffic look normal.

Worryingly, Afrahim said that he searched for the code on publicWWW and found 6593 web pages that are probably hosted by Volusion and are "probably compromised".

"While the results might not mean that all the 6,600 websites are compromised, it's safe to assume to all the vnav.js files are pointing to singular location and once that is compromised, the entire customer base of Volusion is compromised," he wrote.

Featured Resources

Virtual desktops and apps for dummies

An easy guide to virtual desktop infrastructure, end-user computing, and more

Download now

The total economic impact of optimising and managing your hybrid multi-cloud

Cost savings and business benefits of accelerating the cloud journey

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

What’s next for the education sector?

A new learning experience

Download now

Recommended

Cyber attacks on manufacturing up 300% in a year
Security

Cyber attacks on manufacturing up 300% in a year

11 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021