Magecart Strikes Again
Ticketmaster, British Airways, and Newegg have all been compromised. Who’s next? Read our research to see how we discovered the breaches.
IDG Connect: 2017 State of Enterprise Digital Defense Report
Findings quantify the security management gap and business impact of external web, social, and mobile threats.
Get the Research Report
Frost & Sullivan: The Digital Threat Management Platform Advantage
The material benefits of a platform-based approach to security outside the firewall.
Read the Report
2018 Holiday Shopping Season Threat Activity: A Snapshot
The 2018 holiday shopping season was the largest ever for online retailers, but threat actors filled their pockets, too.
So what did the threat activity around this shopping frenzy look like?
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
EMA Radar™ Q4 2017 Report
RiskIQ ranked a technology and value leader in digital threat intelligence management.
Get the Analyst Report
We have previously reported on the impact the current cryptocurrency mania has had on the tactics threat actors are using. These range from phishing to directly probing for Internet-connected digital wallets.
This past weekend has shown the extensive nature of potentially compromised websites where cryptominers such as Coinhive have been embedded directly into a website or injected via a compromised third-party component such as the recent example of Texthelp. According to RiskIQ web crawling data, upwards of 50,000 websites have been observed using Coinhive in the past year, many of them likely without the original owner’s knowledge. Here’s how we are helping our customers address this issue.
Our customers tend to be large corporations and government agencies, so there’s a very low probability for a cryptominer to be present on their websites legitimately. Therefore, step one is to detect any web assets with a cryptocurrency miner running on it, and confirm that asset is a part of the organization’s inventory.
RiskIQ’s webpage-crawling infrastructure monitors assets in our customers’ Digital Footprint on a regular basis. Crawlers download and analyze website content to identify the individual technical components that load when rendered. Currently, we have detection rules for the following miners: Coin Have, CryptoLoot, Coinerra, ProjectPoi, Papoto, MineMyTraffic, CoinImp, Minr, Coinhive, JSE Coin, and CryptoNight Miner.
Using our Global Insights Dashboard in Digital Footprint Inventory, customers have an instant view of the number of websites containing cryptominer technology:
Fig-1 Global Insights Dashboard
Clicking on a specific asset leads to a detail view where customers can see exactly when the cryptominer technology was observed running on the asset.
Fig-2 View of specific asset showing when the cryptomining component was observed
The next step is to inspect the website and identify if the cryptominer was placed directly or was injected via a compromised third-party plugin. The RiskIQ team can help you identify exactly where in your website and through which component the cryptominer was injected.
Fig-3 DOM capture shows where on the web page the script is running
So now you’ve found, investigated, and remediated any compromised sites. Why does this happen, and what do you do next?
Conducting business online means you have a digital presence which introduces risks and challenges many organizations are not ready to tackle. Digital Threat Management from RiskIQ is the solution to that, and having a platform to manage what you own is step one. The recommendations from the security community have been to implement Content Security Policy and Subresource Integrity. It takes effort both at the single asset level for an application developer and also for a security team to monitor a portfolio of assets.
RiskIQ can help security teams by providing a system of record and monitoring on the status of the external attack surface. You can view assets in Inventory at an individual level or at an aggregate level to understand exposure and the progress of a security program.
Fig-4 Viewing at an individual level
Fig-5 Viewing at an aggregate level.
RiskIQ Digital Footprint has you covered by continuously discovering an inventory of your externally-facing digital assets and managing risks across your attack surface. If you would like more information about RiskIQ Digital Footprint Enterprise can help you with exposure to cryptominers, call us at 888-415-4447 or email us at firstname.lastname@example.org.
The #Magecart supply-chain attack frenzy continues with AppLixir, RYVIU, OmniKick, eGain, AdMaxim, CloudCMS, and Picreel falling victim https://t.co/b7UWqL2PzW #BrowserThreats
Regarding Forbes: the skimmer was customized for Forbes, it wasn't an automated attack. Here's the rest of the infrastructure (not just for Forbes) they've been setting it up since January:
Fascinating learning about the cyber attacker's playbook from Yonathan Klijnsma: step 1: gain entry. 2. more reconnaissance 3. Theft, then profit #transportsecurity #TSC
Today at the #TransportSecurityCongress, RiskIQ's
@ydklijnsma spoke about the #Magecart breach of British Airways, which you can read more about here: https://t.co/cPqEqVVllj (Photo credit @SmartRailNews)
Context is everything! Here's how using Tags and Classifications in @RiskIQ PassiveTotal can get your team aligned and supercharge your investigations https://t.co/Wk5OfBZPu2 #ThreatHunting