With ecommerce attacks on the rise, it's crucial for businesses to learn how to strengthen their ecommerce security.
Having issues accessing the video above? Watch the video here.
Several years ago the SecurityMetrics Forensics Team started getting an increased number of merchants that were experiencing e-commerce skimming. In one particular case, a merchant was bleeding tons of card data despite having strong security in place. SecurityMetrics forensics ran antivirus scans, checked for malware, ensured their input fields were sanitized, and analyzed their code line by line, but none of these industry-standard efforts showed anything wrong in the merchant’s servers or databases.
At this point, SecurityMetrics Forensic Analyst Aaron Willis (QSA, CISSP, PFI) ran a simulated purchase through the company and found a piece of malicious code attached to a compromised third party. This code was only triggered when a customer filled in the CVV field.
This breach occurred within a company that did everything right—they had layered security and there weren’t any issues with their code. In this case, the third party (i.e., an analysis company that tracked data about shopping carts) had been compromised.
Skimming refers to stealing information at the point of sale, whether that is through an online purchase or a physical card reader. The concept of skimming has been around for decades. In its earliest stages, attackers would overlay a card reader on a card swipe machine. When you swiped your card, the rogue card reader would capture the magnetic data and send it where it could be used by malicious actors.
While this still happens, the majority of skimming has evolved to attacking online sales, thus the newer term “e-commerce skimming.” Other names for e-commerce skimming include formjacking, redirects, key logging, magecart attacks, and javascript skimming.
Skimming isn’t limited to the point of sale. Attackers have adapted this concept to skim all kinds of sensitive data, such as healthcare data, names, phone numbers, addresses, and social security numbers.
Any time you type something into a field on a website, skimming techniques can be applied to take your personal information. Online banking and medical record applications are other examples of high-value targets susceptible to skimming.
People increasingly use the internet for purchasing, banking, selling, socializing, and more, especially due to Covid19. This shift from brick-and-mortar environments to the internet resulted in more online transactions with easier access to data. This makes the internet an even larger target for online criminals.
Skimming is costly. Even for smaller businesses, a breach costs $200,000 on average. Once you have experienced a security breach, the likelihood that it will happen again significantly increases.
Skimming is extremely difficult to detect. In some cases, eskimming can go unnoticed for years. There is a lot of code on a page to evaluate for compromises. Additionally, eskimming has a much broader attack surface because it contains third-party scripts such as business analytics and advertising networks, making it easier for threat actors to attack. Threat actors run reconnaissance scripts, bot traffic, and other strategies to skim information.
Because online criminal activity is automated, the amount of attacks is greater. If you shut down one attack, there are more right behind it. About 4000 websites a day are getting hit with skimming attacks.
It depends on how the attackers are operating.
If they have a connection to the merchant’s webserver and the merchant’s credentials have been compromised, attackers can put programming code directly on the webpage itself. This way, attackers can capture that data as it is entered by a customer. If they have access to the database server, they can access data stored in databases and insert malicious code to steal information at various points of the transaction process.
Attackers may remove file integrity monitoring from a checkout page so they can modify code undetected. We have seen skimming code stored in dropdown lists that populate state or country drop-down boxes. Skimming can also occur through a compromised third-party script library.
Eskimming is especially tricky to detect because no one knows anything is wrong since everything looks and functions as expected. Skimming steals information without disrupting the regular flow of business
One of the ways to combat eskimming is to ensure that your scope is correct. Correct scoping ultimately helps you be aware of all aspects of your network. When you are conscious of the details of your network, you can take appropriate steps to protect it. This will also benefit you if you do get hit with skimming because you will be able to evaluate your whole network and won’t forget about aspects of your network that attackers may be likely to use to skim data.
Your PCI scope involves anything in your business that processes, stores, or transmits cardholder data, and anything that can initiate a connection to any of the systems that handle cardholder data.
Put simply, any device, process, or employee that involves credit card data is in your PCI scope, which means you are responsible to make sure that card data is properly secure.
Some common devices included in PCI scope can be:
You’d be surprised how much credit card data your business is unknowingly storing and in some of the most random places.
SEE ALSO: Finding and Reducing PCI Scope: How to Make Compliance Easier
SEE ALSO: PCI Scope Categories: Keep Your Card Data Separate
To detect eskimming, SecurityMetrics developed web integrity monitoring. Shopping Cart Monitor uses web integrity monitoring to detect eskimming at the point of sale. This technology has the ability to detect malicious activity even on third-party websites that are connected to your shopping cart, which is a feature other security tools
Each security tool has a specific purpose in cybersecurity, which is why a layered security approach is more successful.
Shopping Cart Monitor is a preventative software that continuously monitors websites for any suspicious activity within the shopping cart or point of payment and alerts you if it detects an issue. Shopping Cart Monitor catches threats from compromised third parties by finding malware as it operates in real time in the customer’s browser. And, unique to this type of technology, Shopping Cart Monitor does not need to be downloaded.
Aaron Willis, Forensic Analyst (QSA, CISSP, PFI), explains, “Attackers are as innovative a breed of criminal as they come. Shopping Cart Monitor is important because it helps us continually stay in front of those attackers. It helps us keep your website from becoming the lowest hanging fruit on the tree. By running Monitor, you’re going to stay ahead of attackers . . . if you’re running Monitor, you’re protected.”