Digital Forensics: By Philip Maina 17 hours agoTue Dec 24 2024 13:45:29 Reading Time: 2 minutes Hyperliquid has denied being hacked despite security researchers’ findings The DeFi platform said it hasn’t been compromised by North Korean hackers adding that user funds are safe Security researchers, however, hold that hackers are [...]
European Space Agency’s official web shop was hacked as it started to load a piece of JavaScript code that generates a fake Stripe payment page at checkout.
With a budget over 10 billion euros, the mission of the European Space Agency (ESA) is to extend the limits of space activities by training astronauts and building rockets and satellites for exploring the mysteries of the universe.
The web store licensed to sell ESA merchandise is currently unavailable, showing a message that it is “temporarily out of orbit.”
The malicious script appeared on the agency’s site yesterday and collected customer information, including payment card data provided at the final stage of a purchase.
E-commerce security company Sansec noticed the malicious script yesterday and warned that the store seems to be integrated with ESA systems, which could pose a risk to the agency’s employees.
Sansec found that the domain for exfiltrating the information has the same name as the one used by the legitimate store selling ESA merchandise but has a different top-level domain (TLD).
While the European agency’s official shop uses the “esaspaceshop” in the .com TLD, the hacker uses the same name in the .pics TLD (i.e. esaspaceshop[.]pics), as visible in the source code of ESA’s store:
The script contained obfuscated HTML code from Stripe SDK, which loaded a fake Stripe payment page when customers tried to complete a purchase.
It is worth noting that the fake Stripe page did not look suspicious, especially when seeing that it was served from the official ESA web store.
Source Defense Research, a web application security company, confirmed Sansec’s findings and captured the fake Stripe payment page being loaded on ESA’s official web store.
Yesterday, BleepingComputer reached out to ESA for details about the compromise. Before we received a reply today, we noticed that the web shop no longer served the fake Stripe payment page but the malicious script was still visible in the site’s source code.
In subsequent communication, ESA said that the store is not hosted on its infrastructure and it doesn’t manage the data on it because the agency does not manage the data because it does not own it.
This could be confirmed with a simple whois lookup, which show complete details for ESA’s domain (esa.int) and its web store, where contact data is redacted for privacy.
Digital Forensics: A federal judge in California has agreed with WhatsApp that the NSO Group, the Israeli cybersurveillance firm behind the Pegasus spyware, had hacked into its systems by sending ...
Digital Forensics: By Philip Maina 17 hours agoTue Dec 24 2024 13:45:29 Reading Time: 2 minutes Hyperliquid has denied being hacked despite security researchers’ findings The DeFi platform said it [...]
Post comments (0)