FBI warns of scraping attacks targeting online checkout pages
The U.S. Federal Bureau of Investigation has issued a flash alert warning businesses that cybersecurity actors are scraping credit card data from online checkout pages.
The alert, sent Monday, states that as of January, the unidentified cyber attacker scraped credit card data from a business by injecting malicious PHP code into the business’ online checkout page. The attacker then sent the scaped data to a service that spoofed a legitimate card processing server.
Furthermore, it’s claimed that the attack also established backdoor access to the victim’s system by modifying two files within the checkout page.
This form of attack is hardly new, since Magecart attacks have been prevalent for years. But as ZDNet pointed out today, it appears that the methodology of inserting a different PHP function is a new variation on the typical attack. The actors create a backdoor using a debugging function and then installs two web shells onto the service, giving additional room for exploitation.
The FBI recommends that businesses update and patch all systems, change default login credentials and monitor requests performed against e-commerce systems to identify possible malicious activity. It is also recommended that websites be secured with SSL and that third-party software and hardware be installed only from trusted sources.
“This FBI warning is one that U.S. businesses should take very seriously,” Kunal Modasiya, senior director of product management at cybersecurity company PerimeterX Inc., told SiliconANGLE. “An attack whereby bad actors scraped online credit card data by injecting malicious PHP code into the checkout page is yet another way to steal customers’ personally identifiable information and payment data, abuse account information and commit fraud.”
Dave Cundiff, chief information security officer at managed security services company Cyvatar, noted that continually verifying and monitoring an organization’s fundamental cybersecurity is a requirement these days.
“If the fundamentals of an organization’s security are not strong, then the additional complexity of any additional security is useless,” Cundiff explained. “Almost all of the attacks or compromises we have been tracking over the last couple of years could have been prevented or at least had the impact greatly reduced by following the basic hygiene approach of fundamental security.”
Cundiff added that patching systems, changing default passwords and reducing overlap in system communication have been security staples for decades. “It is more and more critical to not get distracted by flashy sales pitches and focus on making sure your organization’s fundamental security is solid before moving to more advanced mitigations,” he said.
Photo: Defense.gov
A message from John Furrier, co-founder of SiliconANGLE:
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU