Estimated reading time: 6 minutes
Every day we hear about some new technology threats or vulnerabilities. Lately we talk about the data collection attack known as “Magecart”. Let’s try to understand what it is and how we can do to defend ourselves.
Magecart is a large group of hackers as well as a typical attack that mainly targets online shopping carts. This type of attack has become very common in recent years.
What is the Magecart attack?
The experts of cyber security noticed this activity of the criminal group in 2010, even though Magecart is become very well known recently. For over 10 years of observation, the Magecart attack has been detected about 2 million times. Since 2010, Magecart is responsible for hacking more than 18,000 hosts. By driving the malicious code, the criminals used 573 domains with about 10,000 download links with Magecart malware.
According to Computerweekly , Magecart attacks on online retailers increased by 20% during the COVID-19 pandemics.
How the Magecart-attack works
data skimming attacks such as Magecart typically follow a well-established pattern. They must achieve three things to be successful.
1. Go to the site
There are typically two ways attackers gain access to the website and place the skimming code. They can break into your infrastructure or server and put the skimmer there. Or, they’ll go to one of your third-party vendors, especially if they’re an easier target, and infect a third-party tag that will execute a malicious script on your site when invoked in the browser.
2. Collect sensitive information
3. Send the data to a server
This is the simplest part of the whole process. Once the hackers have access to your website and collect the data they want, the game is over. They can send information from end-user browsers to almost any place on the Internet.
The current state
In 2019, during a lightning attack, cybercriminals hacked nearly 1000 e-commerce sites in just 24 hours , proving that they didn’t act manually, but instead used automated tools. Most of the resources affected were small e-shops, although they also include several large companies.
The skimming script was used to steal information from online store visitors, specifically, their bank card details, names, phone numbers and addresses. Then the script records all data entered on payment pages and stores them in the browser until the victim refreshes the page or switches to another tab. The stolen data is then sent to a server controlled by the cybercriminals.
How to deal with the situation
The problem with Magecart is that there is a lot of confusion when it comes to actually protecting these web-based card skimming attacks. For example, auditing of a website on a regular basis cannot stop the attacks, as the problem comes from third party tags, which auditing will not detect.
How to actively protect yourself
To protect your company from Magecart attacks, take a complete inventory of your digital assets using our CTI service . Next, find all possible web and mobile applications, set a security score for each of them, and show which apps are to be fixed and secured. The service can also search the Dark Web, cloud archives and code repositories for all possible data leaks.
The approach adopted is proactive and is based on looking for compromises before they have occurred. This approach, which actively manages the attack surface and scans the dark web, allows for a complete view of the security status of the digital system.
After a complete inventory you can proceed with a Penetration Test to verify the situation and protect your company from any security threats. The Magecart attack, as well as other more modern attack methods that cybercriminals are constantly inventing, can only be countered with this kind of proactive approach, keeping your guard up.
If you have any questions or would like to know how our services can secure your business, please do not hesitate to contact us.
Tempo di lettura: 5 minUtilizzo del Machine Learning per proteggere i dati Introdotto nel gennaio 2017, Acronis Act… https://t.co/mhqalBxm8D
Gli attacchi informatici sono numerosi e non fanno distinzione tra aziende e singoli individui quando prendono di m… https://t.co/uOucUWZf7W
Estimated reading time: 5 minutes SNYPR è uno strumento di analisi della sicurezza in grado di trasformare i Big… https://t.co/oies7e0nYY
Estimated reading time: 5 minutes Con l’avvento delle piattaforme di big data, le aziende che si occupano di sicu… https://t.co/MSvA0dPgiE