By Source Defense
In 2022, a staggering 60 million payment card records were put up for sale on the dark web. Of these, 45.6 million were obtained through card-not-present transactions, meaning they were stolen during online purchases.
The notorious group known as Magecart employs various tactics to carry out their campaigns. They use fake payment card forms, exploit legitimate merchant websites to deploy e-skimmers, and cleverly use HTTP referer headers to impede security analysts from finding solutions. One of their tactics involves compromising online ordering platforms, putting merchants who use these platforms at risk.
Throughout 2022, the Recorded Future® Magecart Overwatch program discovered 1,520 malicious domains involved in infecting 9,290 e-commerce websites at some point. By the end of the year, 2,468 of these websites were still actively infected. This should come as no surprise, as many high-profile Magecart attacks went undetected for months or even years.
How to Stop Magecart Attacks
If you want to know how to stop Magecart attacks cold in their tracks, you first need to understand what makes them tick.
Start With The Browser
This code is downloaded dynamically from a remote server, bypassing the traditional security infrastructure, including the website owner’s firewalls and web application firewalls (WAFs). Third-party and fourth-party scripts have an identical level of control as the website owner’s own script. Every script on the page, no matter its origin, has access and authorship capability, meaning it can change the webpage, access all information (including forms), and even record keystrokes and save them.
Most organizations have limited means to dynamically detect any changes to these 3rd party scripts and no means of using server-side security solutions to prevent them from exfiltrating data or executing other malicious activity from the customer’s browser.
Source Defense Stops Magecart Attacks
Achieve unparalleled peace of mind with our ‘set it and forget it’ security and data privacy solution. Source Defense meets the core requirements of PCI DSS 4.0 under sections 6.4.3 and 11.6.1, ensuring your compliance.
No more restless nights for cybersecurity analysts. Our platform efficiently and automatically manages a critical aspect of their job, allowing them to focus on other valuable activities during the workday.
Gain complete visibility into potential risks with our free website risk analysis. The Source Defense team is ready to help close the gap in your eCommerce security. Act now and protect your business.
PCI DSS 4.0 makes client-side security a priority.
Source Defense delivers a solution for 6.4.3 and 11.6.1 without adding a burden to your security teams.