Wednesday, March 12, 2025
No menu items!
HomeCyber SecurityThreat Actors Using Stolen Browser Fingerprints to Evade Security and Mimic Real...

Threat Actors Using Stolen Browser Fingerprints to Evade Security and Mimic Real Users

Cybercriminals Exploit Stolen Browser Fingerprints to Bypass Security and Impersonate Legitimate Users

A sophisticated cybercriminal operation, known as ScreamedJungle, has been uncovered by cybersecurity researchers. This campaign uses stolen browser fingerprints to bypass fraud detection systems and impersonate legitimate users, posing a significant threat to online security.

Since May 2024, ScreamedJungle has been exploiting vulnerabilities in outdated Magento e-commerce platforms. Attackers inject malicious scripts into these sites, enabling them to collect unique digital identifiers from unsuspecting visitors.

Browser fingerprinting, a technique that gathers detailed information about a user’s browser and device—such as installed fonts, screen resolution, and graphics card data—has become an essential tool for both cybersecurity and cybercriminals alike. Researchers at Group-IB found that by mimicking these fingerprints, the attackers can make automated attacks appear as legitimate user activity, allowing them to bypass protections like multi-factor authentication (MFA) and device reputation checks.

The Mechanics of the ScreamedJungle Campaign

The attack begins with the exploitation of Magento e-commerce sites running outdated software, particularly older versions like Magento 2.3, which have not received security updates since September 2022.

The ScreamedJungle threat actor exploits vulnerabilities such as CVE-2024-34102 (CosmicSting) and CVE-2024-20720 to inject malicious JavaScript code into these compromised websites.

The injected script, hidden within an innocuous comment tag, pulls additional code from the attacker-controlled domain busz[.]io. This script activates only for desktop users and collects over 50 parameters through functions like GetSystemFontData, GetWebGPUData, and GetKeyboardLayout. The data is then sent to hxxps://customfingerprints[.]bablosoft[.]com/save, where it is stored in a private database linked to Bablosoft’s FingerprintSwitcher module.

PerfectCanvas and Automated Attacks

ScreamedJungle uses PerfectCanvas technology to clone browser fingerprints by rendering canvas elements on remote servers. This ensures that the fingerprint replication is pixel-perfect, mimicking legitimate user activity. With the help of Bablosoft’s BrowserAutomationStudio (BAS), the attackers automate credential-stuffing attacks while avoiding detection.

The impact of this campaign is significant. Just nine compromised Italian e-commerce sites exposed over 200,000 user profiles per month. Researchers from Group-IB estimate that ScreamedJungle has harvested millions of fingerprints globally since May 2024.

How to Defend Against These Threats

To protect against such advanced threats, businesses must promptly patch vulnerabilities and monitor their sites for unauthorized script injections. Additionally, device-binding protocols should be implemented to prevent unauthorized access.

Users can protect themselves by adopting privacy-focused browsers like Brave or Tor and using anti-fingerprinting extensions to limit tracking and ensure greater anonymity online.

Fintter Security
Fintter Securityhttps://fintter.com
I’m a cybersecurity expert focused on protecting digital infrastructures for fintech and enterprise businesses. I specialize in Open Source Intelligence (OSINT) and use social media insights to help drive business development while defending against cyber threats. I offer full security services, including firewall setup, endpoint protection, intrusion detection, and secure network configurations, ensuring your systems are secure, well-configured, and maintained. I’m available for consultancy and security services. Contact me at info@fintter.com or via WhatsApp at +2349114199908 to discuss how I can strengthen your organization’s cybersecurity and business growth.
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

Recent Comments