{"id":17381,"date":"2020-01-08T11:10:02","date_gmt":"2020-01-08T19:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/01\/08\/news-11117\/"},"modified":"2020-01-08T11:10:02","modified_gmt":"2020-01-08T19:10:02","slug":"news-11117","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/08\/news-11117\/","title":{"rendered":"6 ways hackers are targeting retail businesses"},"content":{"rendered":"<p><strong>Credit to Author: Kayla Matthews| Date: Wed, 08 Jan 2020 18:04:10 +0000<\/strong><\/p>\n<p>Retail hacking is no new phenomenon, although it has increased in frequency over the last few years. In fact, retailers experienced more breaches than <a href=\"https:\/\/www.prnewswire.com\/il\/news-releases\/intsights-finds-cybercrime-costs-retailers-30-billion-a-year-300958393.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">any other industry in 2019<\/a>, and they&#8217;ve lost over $30 billion to cybersecurity attacks. <\/p>\n<p>Both brick-and-mortar and online businesses experience retail hacking. Cybercriminals must often work harder to access online stores because these companies&#8217; reputations ride on secure transactions. However, they&#8217;re not exempt from the flood of break-ins that happen during high-volume shopping seasons, including back-to-school, Black Friday, and the winter holidays. <\/p>\n<p>Last-minute shoppers become the victims of retail hackers looking for simple ways in. Many consumers rush to buy gifts before the holidays sneak up on them, meaning they&#8217;re less diligent about scams and fraudulent sites. Shoppers might be willing to visit stores and webpages they&#8217;ve never been to before in search of hard-to-find items. Threat actors know this and take advantage of it with <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/10-tips-safe-online-shopping-cyber-monday\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"scarily authentic scams (opens in a new tab)\">scarily authentic scams<\/a>.<\/p>\n<p>Even though the holidays have passed, shoppers should remain vigilant about scams and retail attacks\u2014especially as web skimmers up the ante with <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"social engineering (opens in a new tab)\">social engineering<\/a> tactics and <a rel=\"noreferrer noopener\" aria-label=\"evasion methods (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/new-evasion-techniques-found-in-web-skimmers\/\" target=\"_blank\">evasion methods<\/a>. Businesses, too, will benefit from strengthening their security protocols and staying up-to-date on the latest hacking methods.<\/p>\n<h3>1. Credential stuffing<\/h3>\n<p>Retail hackers frequently use <a rel=\"noreferrer noopener\" aria-label=\"credential stuffing (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/hackers-gonna-hack-anymore-not-keep-reusing-passwords\/\" target=\"_blank\">credential stuffing<\/a>, or the use of stolen usernames and passwords, to break into systems because it&#8217;s one of the easiest ways to siphon off data. Many people use the same passwords across multiple sites, which leaves them open to invasion. Hackers collect these credentials via purchase from the dark web or databases of <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"personally identifiable information (opens in a new tab)\">personally identifiable information<\/a> left online after massive breaches, and use them to hack into retailers and buy products. <\/p>\n<p>Chipotle experienced a breach like <a href=\"https:\/\/www.newsweek.com\/was-my-chipotle-account-hacked-amid-complaints-burrito-company-says-it-sees-1400981\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">this earlier in 2019<\/a>, where costumers&#8217; credit cards racked up hundreds of dollars in food purchases. However, many customers argued that their passwords were unique to Chipotle, which begs the question of how else cybercriminals could have accessed their accounts.<\/p>\n<h3>2. Near field communication (NFC)<\/h3>\n<p>Price scanners, cell phones, and card readers are notorious targets for NFC breaches. NFC technology allows customers to use their phones to purchase goods by tapping them against a reader. <\/p>\n<p>Similarly, someone can scan <a rel=\"noreferrer noopener\" aria-label=\"a QR code (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/07\/qr-code-scam-can-clean-out-your-bank-account\/\" target=\"_blank\">a QR code<\/a> and gain access to an exclusive app or land on a site where they can purchase items. Though NFC is convenient, retail hackers have little problem intercepting the data from its transactions and stealing information. <\/p>\n<p>Even malware can pass from infected phones to retail systems. NFC technology is prevalent in face-to-face transactions, but more sites are hosting QR codes for users to scan. Hackers generally use several different ways to manipulate data transmitted over a distance:<\/p>\n<ul>\n<li><strong>Corruption:<\/strong> They use a third device to intercept a connection between two other electronic devices, which destroys the information being sent.<\/li>\n<li><strong>Eavesdropping:<\/strong> Cybercriminals pick up on private information by recording communications between two devices. Using this technique can give someone access to credit cards and other payment information.<\/li>\n<li><strong>Modification:<\/strong> The hacker manipulates the data before it reaches its intended source\u2014meaning they can alter important details or inject malware or other harmful components.<\/li>\n<\/ul>\n<h3>3. RAM scraping<\/h3>\n<p>RAM scraping is a procedure hackers use to enter point-of-sale software. Every card transaction leaves data in the retailer&#8217;s terminal system. This information lasts temporarily as a part of the machine&#8217;s RAM, but threat actors can implant POS malware that reads this input before it disappears. By scraping this information, they obtain all the items stored on a card&#8217;s tracks\u2014such as the account number, CVN, and expiration date.<\/p>\n<p>The massive Target <a href=\"https:\/\/mashable.com\/2018\/04\/04\/every-store-retailer-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">breach of 2013 is one example<\/a> of RAM scraping in action. Text strings containing credit card information can remain in a retailer&#8217;s database for seconds, minutes, or hours. The longer it stays, the more chances hackers have for grabbing it before it goes.<\/p>\n<h3>4. Card readers<\/h3>\n<p>The magnetic strips on credit and debit cards <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.getvms.com\/blog\/identity-theft-protect-your-business-and-customers\/\" target=\"_blank\">make them frequent targets<\/a> for cybersecurity attacks. Hackers don&#8217;t always need to force their way into online accounts\u2014they can glean data from a single card swipe. Card data, which includes PINs and card numbers, remains encrypted until the moment of the swipe. Skilled criminals can take this opportunity to snatch the information and use it for themselves or sell it to others.<\/p>\n<p>Many retailers and card companies have switched to chips instead of magnetic strips. Chips create a unique code that is only used for a single purchase. This form of <a rel=\"noreferrer noopener\" aria-label=\"EMV technology (opens in a new tab)\" href=\"https:\/\/www.creditcards.com\/credit-card-news\/emv-faq-chip-cards-answers-1264.php\" target=\"_blank\">EMV technology<\/a>\u2014which stands for Europay, Mastercard, and Visa\u2014makes it harder to duplicate information and use it for subsequent transactions.<\/p>\n<h3>5. Web skimming<\/h3>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Web skimmers (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/11\/web-skimmer-phishes-credit-card-data-via-rogue-payment-service-platform\/\" target=\"_blank\">Web skimmers<\/a> had quite a year in 2019, helped along by the criminal groups known collectively as <a rel=\"noreferrer noopener\" aria-label=\"Magecart (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/how-to-protect-your-data-from-magecart-and-other-e-commerce-attacks\/\" target=\"_blank\">Magecart<\/a>, which were responsible for developing a slew of new techniques for stealing from online retailers and consumers alike. <\/p>\n<p>Web skimmers sneak malware into website codes to glean personal information from customers. All e-commerce sites have a payment page for completing purchases, most of which are securely encrypted. However, those without airtight security are prime targets for web skimmers. This malware is hard to detect\u2014especially for small businesses without advanced tech\u2014and it can affect hundreds of customers at a time, making it a favorite among threat actors.<\/p>\n<p>Skimmers enter sites through a third party, such as plug-in or an e-commerce page. These entryways are easier to get through because they often contain weaker code structure. (First-party entry commonly happens only to those small sites without strong cybersecurity measures in place.) Once the script infects the webpage, it funnels passwords, social security numbers, and credit card numbers back to the cybercriminals&#8217; servers.<\/p>\n<h3>6. Social engineering<\/h3>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Social engineering (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2018\/08\/social-engineering-attacks-what-makes-you-susceptible\/\" target=\"_blank\">Social engineering<\/a> might sound like a term too vague to be real, but this tactic is one of the oldest in the criminal book, useful for preying on emotions. In the pre-Internet days, someone might dress up as an employee of a department store and pretend to work there to access private information. They might ask other employees for information, knowing that some harried workers will readily supply it so they can return to their tasks. Others might loiter in front of a store and <a rel=\"noreferrer noopener\" aria-label=\"scam people out of cash (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/07\/good-twitter-samaritans-accidentally-prevent-shoeshine-scam\/\" target=\"_blank\">scam people out of cash<\/a> using the old shoeshine technique.<\/p>\n<p>Online, social engineering looks a bit different for retailers and shoppers. Websites might sell <a rel=\"noreferrer noopener\" aria-label=\"counterfeit goods at too-good-to-be-true prices (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/hundreds-of-counterfeit-online-shoe-stores-injected-with-credit-card-skimmer\/\" target=\"_blank\">counterfeit goods at too-good-to-be-true prices<\/a>, then snatch the personal information of customers while they&#8217;re at it. Watering hole attack strategies target hundreds of users at a time <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/01\/hacking-your-head-how-cybercriminals-use-social-engineering\/\">by analyzing their Internet browsing habits<\/a> then laying siege at sites known to attract particular user groups, such as mommy blogs, gamers, or foodies. <a rel=\"noreferrer noopener\" aria-label=\"Phishing emails (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\">Phishing emails<\/a> might pose as favorite retailers asking for account updates, while delivering malware or ransomware instead.<\/p>\n<h3>Beating web threats <\/h3>\n<p>With so many ways to steal information, it&#8217;s plain to see why retail cybercriminals often see success during the holidays and otherwise. Although retail hacking runs rampant during high shopping seasons, it doesn&#8217;t have to deter shoppers from completing their last-minute purchases. The onus is on businesses to secure their data and build trust with their consumers and partners. <\/p>\n<p>Though no system is entirely unhackable, businesses should follow standard cybersecurity procedures and aim for the best defenses possible. Prioritizing user safety will allow them to build trustworthy relationships with their shoppers.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2020\/01\/6-ways-hackers-are-targeting-retail-businesses\/\">6 ways hackers are targeting retail businesses<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2020\/01\/6-ways-hackers-are-targeting-retail-businesses\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Kayla Matthews| Date: Wed, 08 Jan 2020 18:04:10 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/web-threats\/2020\/01\/6-ways-hackers-are-targeting-retail-businesses\/' title='6 ways hackers are targeting retail businesses'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/shutterstock_141110656.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Whether it&#8217;s a high-volume shopping season or not, retail businesses are at risk from cybercriminals in a number of ways. Learn how hackers target retailers and shoppers alike.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/web-threats\/\" rel=\"category tag\">Web threats<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/credential-stuffing\/\" rel=\"tag\">credential stuffing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emv-technology\/\" rel=\"tag\">EMV technology<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/near-field-communication\/\" rel=\"tag\">near field communication<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nfc-technology\/\" rel=\"tag\">nfc technology<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-retail\/\" rel=\"tag\">online retail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-retailers\/\" rel=\"tag\">online retailers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-scams\/\" rel=\"tag\">online scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/qr-code\/\" rel=\"tag\">QR code<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/qr-codes\/\" rel=\"tag\">QR codes<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ram-scraping\/\" rel=\"tag\">ram scraping<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/retail-scams\/\" rel=\"tag\">retail scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimmer\/\" rel=\"tag\">web skimmer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimmers\/\" rel=\"tag\">web skimmers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-skimming\/\" rel=\"tag\">web skimming<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-threats\/\" rel=\"tag\">web threats<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/web-threats\/2020\/01\/6-ways-hackers-are-targeting-retail-businesses\/' title='6 ways hackers are targeting retail businesses'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2020\/01\/6-ways-hackers-are-targeting-retail-businesses\/\">6 ways hackers are targeting retail businesses<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[21323,23869,19622,23870,23871,23872,23873,23874,22519,18765,23875,23876,10510,23515,19624,23516,11716],"class_list":["post-17381","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-credential-stuffing","tag-emv-technology","tag-magecart","tag-near-field-communication","tag-nfc-technology","tag-online-retail","tag-online-retailers","tag-online-scams","tag-qr-code","tag-qr-codes","tag-ram-scraping","tag-retail-scams","tag-social-engineering","tag-web-skimmer","tag-web-skimmers","tag-web-skimming","tag-web-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17381"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17381\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17381"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}