Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/3/2013
06:59 PM
50%
50%

Black Friday To Cyber Monday: Keeping Hackers From Having Their Day

Businesses should be especially mindful about online security on the year's biggest shopping days

Stores across the country were a madhouse when Black Friday arrived, with throngs of shoppers showing up to take advantage of seasonal sales. Online, the customer rush has been similar, though the security challenge businesses face takes on a different form.

This year, according to analytics firm comScore, online sales on Black Friday totaled an estimated $1.198 billion. But alongside those numbers are numbers like these from fraud prevention firm Signifyd: An estimated 1.2 percent of e-commerce sales on smartphones were fraudulent. A legitimate transaction on a tablet averaged $132. A fraudulent transaction on a tablet averaged $216.

More numbers: On Dec. 2, investigators from law enforcement agencies around the world seized 690 domain names belonging to sites trafficking in counterfeit goods.

"Black Friday and Cyber Monday just provide an additional avenue that makes the threats seem more legitimate and create spikes in an overwhelming flow of attacks," explains Colby Clark, director of incident management at FishNet Security. "People are torn, on one hand, by the desire to be mindful of cyberthreats and, on the other, by trying to take advantage of a deal that seems too good to miss. Unfortunately, the latter usually wins."

Some managed security providers noted that they did not see an abnormal amount of malicious activity affecting their customers on either day. However, according to Clark, much of the malicious activity surrounding Black Friday and Cyber Monday may not have been identified yet. Often, he says, successful website hacks may not be noticed for weeks or longer due to a lack of monitoring.

For the most part, Black Friday and Cyber Monday hacks focus primarily on social engineering, he says.

"People are expecting solicitations and massive discounts -- their guard is down and will likely click on things they otherwise would not," says Clark, noting an uptick on attacks targeting vulnerabilities on mobile devices.

During high volume times for a site, it may be easier for a cyberattack to be masked by the normal flow of traffic, "similar to how a thief may be able to get away with shoplifting easier when a store is busy," Jon French, security analyst at AppRiver, tells Dark Reading.

"It’s always a good idea to keep an eye on any public-facing part of the Internet, but it may be a good idea to play it safe and keep a closer eye during these peak shopping seasons for online retailers," French says. "This could involve a variety of actions, such as monitoring network patterns or looking for really out-of-the-ordinary orders coming in."

In preparation for Black Friday and Cyber Monday, security experts at consulting firm Neohapsis recommended businesses use HTTPS to make sure all data between customers and their sites is encrypted, and to check that systems are patched and updated.

"Businesses should ensure their workstations are in a good security place," advises Catherine Pearce, security consultant at Neohapsis.

"Unfortunately, this event offers both a good pretense and a good opportunity for security problems if attackers can somehow convince or trick your users into visiting attack sites on their computer," she adds. "Attackers have been abusing popular trends for years ... they can use Cyber Monday to attack your users, include phishing, blackhat SEO, and watering-hole attacks, where attackers have already compromised a legitimate site, but wait for a time of high traffic to launch their attack."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30485
PUBLISHED: 2021-04-11
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd(), while parsing a crafted XML file, performs incorrect memory handling, leading to a NULL pointer dereference while running strcmp() on a NULL pointer.
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.