Magecart Strikes Again
Ticketmaster, British Airways, and Newegg have all been compromised. Who’s next? Read our research to see how we discovered the breaches.
IDG Connect: 2017 State of Enterprise Digital Defense Report
Findings quantify the security management gap and business impact of external web, social, and mobile threats.
Get the Research Report
Frost & Sullivan: The Digital Threat Management Platform Advantage
The material benefits of a platform-based approach to security outside the firewall.
Read the Report
2018 Holiday Shopping Season Threat Activity: A Snapshot
The 2018 holiday shopping season was the largest ever for online retailers, but threat actors filled their pockets, too.
So what did the threat activity around this shopping frenzy look like?
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
EMA Radar™ Q4 2017 Report
RiskIQ ranked a technology and value leader in digital threat intelligence management.
Get the Analyst Report
October 9, 2018
Digital Risk Management Leader Helps Shopper Approved Mitigate Damages of Breach
SAN FRANCISCO – October 9, 2018 – RiskIQ, the global leader in digital risk management, today reveals it helped mitigate and prevent damages from yet another attempted large-scale supply chain attack by the well-known credit card-skimming gang, Magecart. Magecart is the umbrella term given to seven similar groups implicated in the breaches of Ticketmaster, British Airways, and Newegg.
With its internet-scale visibility and its detection algorithms now well-honed on the Magecart skimmer, RiskIQ was automatically alerted to the compromise of Shopper Approved, a customer rating plugin that integrates with thousands of e-commerce sites. As observed in the July Magecart attack against Ticketmaster, this attack did not attempt to breach a single store directly, but rather a widely used third-party that gives attackers access to thousands of sites at once.
RiskIQ’s researchers immediately reached out to Shopper Approved to provide information and assistance with remediation. Since the incident, RiskIQ has been in frequent contact with the company, which removed the skimmer and launched a full-scale internal investigation using a leading forensics firm to determine how the breach happened and which sites were affected.
“On behalf of Shopper Approved, I want to personally thank the RiskIQ team for the diligence and incredible effort they’ve taken in helping us detect and secure our code in such a short amount of time,” said Shopper Approved co-founder and CEO Scott Brandley. “It is rare when you find a company like RiskIQ who genuinely helps people, simply because it is the right thing to do. RiskIQ helped significantly limit the impact caused by Magecart – and for that, we will be forever grateful.”
While Shopper Approved is active on thousands of websites, due to early mitigation efforts and the fact that the skimmer only appeared on a small percentage of the checkout pages, Magecart impacted only a fraction of these sites. RiskIQ stresses that during this time of heightened Magecart activity, e-commerce sites should be monitoring their checkout pages closely.
“If you own an e-commerce company, it’s best to remove the third-party code from your checkout pages whenever possible,” said Yonathan Klijnsma, Head Researcher at RiskIQ. “Many payment service providers have already taken this approach by prohibiting third-party code from running on pages where customers enter their payment information.”
As Magecart groups evolve—initial attacks involved low-tier Magento stores and have grown in sophistication to target CDNs, which the threat actors now tune to ensure the only sites they hit are online stores—any supplier of functionality to online e-commerce websites is a potential victim. RiskIQ, which detects internet-scale threats, is alerted to new Magecart breaches hourly, a clear indication that the group is extremely active and a genuine threat to all organizations offering online payment facilities.
RiskIQ is monitoring all Magecart groups and will continue to report publicly on their activity. For a full analysis of this campaign, including a list of compromised components and IOCs, visit the report here: https://www.riskiq.com/blog/labs/magecart-shopper-approved/
RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by tens of thousands of security analysts, security teams and CISO’s, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk and take action to protect the business, brand and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners and MassMutual Ventures.
Visit https://www.riskiq.com or follow us on Twitter. Try RiskIQ Community Edition for free by visiting https://www.riskiq.com/community/.
© 2018 RiskIQ, Inc. All rights reserved. RiskIQ is a registered trademark of RiskIQ, Inc. in the United States and other countries. All other trademarks contained herein are the property of their respective owners.
Front Lines Media