Skip to main content (Press Enter).
Sign In or Join
Skip auxiliary navigation (Press Enter).
Skip main navigation (Press Enter).
Global Security Forum
QRadar Windows Event Collection
Local Groups - Africa / Middle East
Local Groups - Asia / Pacific
Local Groups - Europe
Local Groups - North America
Local Groups - South America
Security Community Events
All IBM Community Events
Post to Forum
Share a Resource
Connect with Security Users
Security Learning Academy
Request for Enhancements
On-Demand Webinar Library
Middleware User Community
Data Science Community
Marketing & Commerce Community
B2B Collaboration Community
Business Analytics Community
Cloud Private for Data Community
Hybrid Data Management Community
Unified Governance and Integration Community
Back to Blog List
IcedID Operators Using ATSEngine Injection Panel to Hit E-Commerce Sites
Wed February 06, 2019 10:44 AM
; Co-authored by
As part of the ongoing research into cybercrime tools targeting users of financial services and e-commerce, IBM X-Force analyzes the tactics, techniques and procedures (TTPs) of organized malware gangs, exposing their inner workings to help diffuse reliable threat intelligence to the security community.
In recent analysis of
attacks, our team looked into how IcedID operators target e-commerce vendors in the U.S., the gang's typical attack turf. The threat tactic is a two-step injection attack designed to steal access credentials and payment card data from victims. Given that the attack is separately operated, it's plausible that those behind IcedID are either working on different monetization schemes or renting botnet sections to other criminals, turning it to a cybercrime-as-a-service operation, similar to the
To read the rest of the blog, please go to
Share IcedID Operators Using ATSEngine Injection Panel to Hit E-Commerce Sites on Facebook
Share IcedID Operators Using ATSEngine Injection Panel to Hit E-Commerce Sites on LinkedI
Copyright 2018 IBM Community. All rights reserved.
Powered by Higher Logic