Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/6/2020
10:30 AM
Ido Safruti
Ido Safruti
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Client-Side JavaScript Risks & the CCPA

How California's new privacy law increases the liability for securing Web-facing user data, and what enterprises can do to mitigate their risk.

On January 1, 2020, California's new privacy law took effect, which will dramatically increase security risks for any company operating there as well as for third parties that might have access to your data. This is a problem because one of the fastest-growing types of cyberattacks — client-side JavaScript attacks — often targets third-party services. Magecart attacks, for example, frequently focus on compromising plug-ins to major e-commerce platforms such as Magento and Shopify or other popular publishing platforms like WordPress to surreptitiously skim customer data.

The California Consumer Privacy Act (CCPA), which dictates how companies and organizations need to secure the data of users, could drive heavy fines against sites that fail to protect against these attacks. The act can also be a positive force to drive major improvements in your web application security approach.

Why Website Issues Are a CCPA Risk
While the CCPA is the strongest state consumer privacy legislation in the United States, the law also has global reach. A French or a Chinese company that has customers, partners, service providers, or offices in California could be fined if its website is breached and California residents are affected.

However, the exposure is broader than data breaches. CCPA extends liability for compromises of user data to third-party services that web application publishers and operators use. This can include payment processors, chatbot operators, and any other provider of third-party services that integrate with web applications. This could mean large financial exposure if California, which has a track record of aggressive enforcement, pursues fines.

In the European Union, recent interpretations of the 2016 General Data Protection Regulation (GDPR) found that JavaScript attacks by malicious third parties to skim sensitive user data that are not promptly spotted and halted constitute GDPR violations. In these instances, the databases and internal systems were never breached; site code was modified, but not by the site's owner. California adopting this view sets a high bar for website operators.

CCPA also sets up a provision under which people whose data is stolen can sue businesses "as a result of the business's violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information." This is a broad mandate to litigation in the event of any type of security incident.

The upshot? CISOs, CMOs, site reliability engineers, and CROs at companies with even small exposure to California should care about liabilities conferred by CCPA on web applications and site code.

CCPA Risks from Third-Party JavaScript Code
Nearly all web applications (including web, mobile web, and hybrid mobile applications) use JavaScript. Increasingly, these applications also use third-party JavaScript libraries and services that are added to their web application. These third-party JavaScript inclusions enhance site functionality in many ways. They also accelerate the speed at which web applications can be constructed, and enable better web application performance by off-loading computationally intensive tasks to third parties.

Unfortunately, it's become hard for companies to keep track of all the third-party JavaScript on their web applications. In a survey of 230 companies averaging 1,000 employees conducted by PerimeterX, 55% of respondents said that more than 50% of their site code is from third parties. Roughly one-fifth said that over 70% of their site code was from third parties, and a surprising 8.3% said they had no idea how much of their site code was third-party code.

Having trouble tracking what third-party services and code companies use complicates auditing for CCPA liabilities. Worse, when third-party libraries and services are hacked or suffer security breaches, the owners of these third-party elements may not notify all website owners that use these libraries and services promptly. The PerimeterX survey found that 42% of respondents have no way to know when and if their site code was changing without their proper authorization.

How to Reduce Risks from Third Parties
Some basic steps can significantly reduce your risk, or, at a minimum, show you performed solid due diligence into the risks third parties confer on your organization (and by extension, on your customers). First, identify all instances of third-party code running on your site. If this code is from third-party open source libraries, then you must treat it as if it's your own code and analyze it for security risks. This includes static code analysis.

For JavaScript from service providers, ask the following questions to gauge their own CCPA risk to you:

  • Do you capture our user data in any way? If yes, please give a detailed explanation how you capture this data.
  • If you capture our data, who has access to that data (additional parties) and how is it secured?
  • How are you checking your code for unauthorized changes? (They should be able to give you a list of steps such as static code analysis and live application scanning.)
  • Do you have full (not partial) SOC 2 or ISO 27001 compliance?

The best offense against CCPA, however, is a good defense. To that end, verify that all your public-facing applications and APIs are properly locked down. All public apps must be guarded by firewalls and other security measures with updated configurations.

To spot any JavaScript attacks early and head off a CCPA risk, deploy a modern artificial intelligence-based anomaly detection platform on real-time data collected in runtime from site visitors, that locates strange code behavior indicating user data is being harvested. [Editor's note: PerimeterX is one of several providers that offer such detection solutions.] These solutions can also give you a real-time updated view of which scripts on your site are actually accessing and collecting personal data, which could provide compliance air cover, as well.

Even if the script is actually a legitimate and uncompromised library or service, compliance rules around data gathering and ability to provide any information on how data is used mandate that site operators must be able to identify every third-party that has access to data, in any way, shape, or form. 

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Disarming Disinformation."

Ido Safruti is a co-founder and CTO at PerimeterX, provider of application security solutions that keep businesses safe in the digital world, detecting risks to web and mobile applications and proactively managing them. Previously, Ido headed a product group in Akamai focused ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.