ATMZOW: recent activity
Figure 1: Google Tag Manager snippet with the attacker's ID
Figure 2: Google Tag Manager script with the attacker's injector
Figure 3: The attacker’s injector
Figure 4: ATMZOW sample with additional obfuscation
Figure 5: ATMZOW sample
Figure 6: Use of a fake payment form in a sample of the ATMZOW JS sniffer
Figure 7: Exfiltration address https://gvenlayer[.]com/track/ in a sample of the ATMZOW JS sniffer
Phishing campaign
Figure 8: Screenshot of a JS script from the page
https://xn--keyvigatrs-key-7oc4531jsva[.]com/ktt/cmd/logon
Connection between the JS-sniffer and the phishing campaign
Connection between the phishing campaign and Hancitor malware
IoCs
Phishing websites with ATMZOW-like obfuscation
Phishing websites detected in the Hancitor campaign with Prometheus TDS
ATMZOW GTM ID
ATMZOW JS sniffer storage
ATMZOW JS sniffer gates