Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/1/2019
05:17 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

PCI Security Council, Retail ISAC Warn Retailers on Magecart Attacks

Online card-skimming activities grew sharply this summer fueled by the availability of attack kits and other factors, Malwarebytes says.

The Retail and Hospitality ISAC (RH-ISAC) and the PCI Security Standards Council (PCI SSC) Thursday issued a joint bulletin warning e-commerce sites about the growing threat to payment security from online card-skimming activity.

The alert came out the same day as a report from Malwarebytes that noted a sharp increase this summer in activities by Magecart operators — an umbrella term for groups behind card-skimming attacks.

According to Malwarebytes, in July its security controls blocked some 65,000 attempts to steal payment card data via card-skimmers on compromised online stores. US-based shoppers represented 54% of those targeted in the Magecart attacks followed by shoppers in Canada (16%) and Germany (7%).

In addition to an increase in the number of compromised e-commerce sites, Malwarebytes also observed a steady increase in what it described as "spray and pray" attacks on e-commerce sites hosting code on Amazon S3 buckets.

Troy Leach, CTO at the PCI SSC, says this week's bulletin with RH-ISAC stemmed from growing concern among stakeholders over the threat. "At our most recent PCI SSC Board of Advisors meeting, retail representatives identified this as an ongoing challenge to identify and monitor," Leach says. "When we contacted the RH-ISAC and Payment Processors via FS-ISAC, they confirmed an increase in these attacks," as well he says.

Online card skimming is not new. Magecart attacks have been happening since at least 2015. NuData Security, a Mastercard company, has estimated that Magecart groups have successfully compromised over 17,000 domains so far. Others have pegged the number much higher.

Magecart victims include numerous large organizations including British Airways, which was recently fined $229 million under GDPR over the incident, as well as Ticketmaster and Newegg.

Carlos Kizzee, vice president of intelligence at the RH-ISAC, says his organization does not have any numbers yet on the financial impact these attacks are having on online merchants. But breaches like the one at British Airways and Newegg highlight just how signficant it can be. "With trillions of dollars flowing through the retail and hospitality sector every year, it comes as no surprise that financial gain is the primary motivation for the majority of threat actors targeting this sector," Kizzee says.

JavaScript Sniffers

In online card-skimming attacks, threat actors insert what's often little more than a few lines of JavaScript code directly into an e-commerce website or into a third-party application or service that a site might be using. Some examples of third-party applications and components in which attackers typically conceal their JavaScript card sniffers include advertising scripts, visitor tracking utilities, live support features, and content management tools.

Magecart actors and other card-skimming outfits use a variety of methods to try and infect a website or third-party, including exploiting vulnerable plugins, brute force login attempts, phishing, and other social engineering techniques, the PCI SSC and RH-ISAC said in their bulletin.

The sniffers are typically designed to check which Web page the user is on, and are triggered when a victim submits card information during the checkout process. Attackers use the sniffers to collected credit-card data and associated data such as the cardholder's name, billing address, phone number, and password. The stolen data is then either stored on the compromised server or sent to an attacker-controlled system, they noted.

The JavaScript sniffers can be very hard to detect and often the card-skimming activity takes place without the merchant knowing about it. The sniffers can also be very persistent: one in five Magecart-infected sites got re-infected in days, the two organizations said, quoting a third-party report.

Jerome Segura, director of threat intelligence at Malwarebytes, says multiple factors are driving the increase in online card skimming. Among them is the growing availability of skimmer kits for launching attacks, he says.

A kit called Inter for sale in underground markets has been especially popular among attack groups in recent months, he says. In a report earlier this year, Fortinet described Inter as a highly customizable, easily configurable skimmer available in underground forums for $1,300 per license.

"Most skimming attacks we see are a result of a breach of the e-commerce platform itself," Segura says. Often, these are sites that haven't been patched, or are vulnerable to brute-force attacks and other exploits. "Supply-chain attacks, where a third-party script has been compromised are more dangerous, although not as common."

The PCI Council and retail ISAC offered several best practices that online merchants can use to mitigate their exposure to the threat. To detect card-sniffers for instance, organizations should consider using file-integrity monitoring or change-detection tools, perform internal and external vulnerability scans, and should conduct periodic penetration tests.

To prevent infection, organizations should patch security vulnerabilities, implement updated malware detection tools, limit access to critical data, and use strong authentication for accessing system key components, they said.

"We want to note that a great amount of our emphasis is on the risks presented from beyond known third-party integrations," RH-ISAC's Kizzee says.

These may be an extension of third-party integrations that are generally not known by the companies that own and maintain the e-commerce websites. "They are thus a source of risk that companies are neither aware of, nor actively managing, in their risk management activities," Kizzee says.

Related Content:

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4019
PUBLISHED: 2020-06-01
The file editing functionality in the Atlassian Companion App before version 1.0.0 allows local attackers to have the app run a different executable in place of the app's cmd.exe via a untrusted search path vulnerability.
CVE-2020-4020
PUBLISHED: 2020-06-01
The file downloading functionality in the Atlassian Companion App before version 1.0.0 allows remote attackers, who control a Confluence Server instance that the Companion App is connected to, execute arbitrary .exe files via a Protection Mechanism Failure.
CVE-2020-4021
PUBLISHED: 2020-06-01
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.
CVE-2020-4023
PUBLISHED: 2020-06-01
The review coverage resource in Atlassian Fisheye and Crucible before version 4.8.2 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the committerFilter parameter.
CVE-2020-4013
PUBLISHED: 2020-06-01
The review resource in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the review objectives.