{"id":16560,"date":"2019-10-10T10:52:15","date_gmt":"2019-10-10T18:52:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/10\/news-10299\/"},"modified":"2019-10-10T10:52:15","modified_gmt":"2019-10-10T18:52:15","slug":"news-10299","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/10\/news-10299\/","title":{"rendered":"VB2019 preview: Inside Magecart: the history behind the covert card-skimming assault on the e-commerce industry"},"content":{"rendered":"<p>Half a decade ago, breaches of point-of-sale (POS) systems were a real plague, especially in North America, with the 2013 <a href=\"https:\/\/krebsonsecurity.com\/2013\/12\/sources-target-investigating-data-breach\/\" target=\"_blank\"><em>Target <\/em>breach<\/a> perhaps the best known example.<\/p>\n<p>Though credit card theft through POS hacks hasn&#8217;t completely disappeared, today&#8217;s skimmers largely act online, using JavaScript to insert skimmers into websites&#8217; payment pages.<\/p>\n<p>The more than a dozen different groups behind these breaches are referred to by the umbrella term &#8216;Magecart&#8217;, a name first used by <em>RiskIQ<\/em> and made popular through a 2016 <a href=\"https:\/\/www.riskiq.com\/blog\/external-threat-management\/inside-magecart\/\" target=\"_blank\">joint report<\/a> by <em>RiskIQ<\/em> and <em>Flashpoint<\/em>. Different groups use different tactics, from targeted attacks against big websites to automatically scanning for known CMS vulnerabilities, to compromising third-party JavaScript code loaded on such websites.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"framed\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/d6ed6a34732fd61fc8ca14d91106ff0e_f3707.png\" alt=\"ecosystem_image1.png\" width=\"660\" height=\"336\" \/><span class=\"centered-caption\">A rich underground economy exists around all the different steps needed to monetize a breach.<\/span><\/p>\n<p>At <a title=\"VB2019\" href=\"\/conference\/vb2019\/\">VB2019<\/a> in London, <em>RiskIQ<\/em> researcher Yonathan Klijnsma will present a <a title=\"Inside Magecart: the history behind the covert card-skimming assault on the e-commerce industry\" href=\"\/conference\/vb2019\/abstracts\/inside-magecart-history-behind-covert-card-skimming-assault-e-commerce-industry\/\">paper on Magecart<\/a>, in which he discusses the history of web skimmers and profiles six Magecart groups to provide a good overview of the different modi operandi of the various groups.<\/p>\n<p>Don&#8217;t forget to <a href=\"https:\/\/extranet.virusbulletin.com\/public_conference.php\" target=\"_blank\">book your ticket for VB2019<\/a> to see Yonathan and dozens of other speakers discuss the latest trends in threat intelligence. And if you are quick, the <a title=\"VB2019 Call for Papers\" href=\"\/conference\/vb2019\/vb2019-call-papers\/\">call for last-minute papers<\/a> for the conference remains open for submissions until the end of this weekend!<\/p>\n<p><a title=\"VB2019\" href=\"\/conference\/vb2019\/\"><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/8815\/4227\/2633\/VB2019-London-withdate-325w.jpg\" alt=\"VB2019-London-withdate-325w.jpg\" width=\"325\" height=\"158\" \/><\/a><\/p>\n<p>outertext<br \/><a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/08\/vb2019-preview-inside-magecart-history-behind-covert-card-skimming-assault-e-commerce-industry\/\" target=\"bwo\" >https:\/\/www.virusbulletin.com\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/d6ed6a34732fd61fc8ca14d91106ff0e_f3707.png\"\/><br \/>                                 We preview the VB2019 paper by RiskIQ researcher Yonathan Klijnsma on the Magecart web skimming attacks.                <\/p>\n<p>                 <a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/08\/vb2019-preview-inside-magecart-history-behind-covert-card-skimming-assault-e-commerce-industry\/\">Read more<\/a>                                <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[23177,10378,23176],"tags":[],"class_list":["post-16560","post","type-post","status-publish","format-standard","hentry","category-magazine","category-security","category-virusbulletin"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16560"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16560\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16560"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}