A sophisticated cybercriminal campaign leveraging stolen browser fingerprints to bypass fraud detection systems and impersonate legitimate users has been uncovered by cybersecurity researchers. Browser fingerprinting—a technique that collects hundreds of browser and device characteristics like installed fonts, screen resolution, and graphics card details—has become a powerful tool for both legitimate security systems and cybercriminals. Cybersecurity analysts at Group-IB detected that by mimicking these fingerprints, attackers can disguise automated attacks as legitimate user activity, bypassing protections like multi-factor authentication (MFA) and device reputation checks. Dubbed ScreamedJungle, the threat actor has been exploiting vulnerabilities in outdated Magento e-commerce platforms since May 2024 to inject malicious scripts that harvest unique digital identifiers from unsuspecting visitors. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The attack begins with the exploitation of unpatched Magento stores, particularly those running end-of-life versions like Magento 2.3, which lacks security updates since September 2022. This method renders canvas elements on remote servers, ensuring pixel-perfect replication of legitimate user fingerprints. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. ScreamedJungle leverages vulnerabilities such as CVE-2024-34102 (CosmicSting) and CVE-2024-20720 to inject a malicious JavaScript payload into compromised websites. Group-IB analysts estimate that ScreamedJungle’s global operations have harvested millions of fingerprints since May 2024. To counter such threats, businesses are urged to patch vulnerabilities promptly, monitor for unauthorized script injections, and implement device-binding protocols.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 24 Feb 2025 17:35:19 +0000