Because Magecart attacks typically leave no visual clues and have no impact on the normal operation of the site, detection can be difficult, and it's often not until the customer Payment Cards are loaded with fraudulent charges that a Common Point of Purchase can be identified to reveal the source of the attack.
There are only two, simple steps required for a Magecart attack to succeed and if an attacker can complete both of them, the impact can be significant.
As a website operator, whilst it would be ideal to successfully neutralise both of these risks, it is sufficient to only neutralise one of them to stop the attack, and, you can focus on only sensitive pages like Payment Pages or your Login Page.
As an e-commerce site, it was part of the normal operation of the site for a customer to enter their Payment Card Data, along with other sensitive PII, like their name and address, into the page. The page then needs to send this data somewhere to be processed and this is where the attack can be reliably detected.
The attackers used a Drop Server located at
webfotce.me could have been detected or even blocked.
Content Security Policy allows you to take full control of where your site can send data, and, using Data Watch, you can be notified if your pages start sending data to a new location, resulting in a Data Breach. Leaking sensitive data like PCD or PII can attract the attention of Privacy Regulators, especially in light of recent regulation like GDPR, and attract heavy fines like that of the ICO, the data regulator in the UK, who fined Ticketmaster.
Once that single line of code or config is deployed, we can establish a baseline for your site and then our Script Watch and Data Watch products will monitor and alert you to any changes on your site for you to investigate immediately. Often, one of the most damaging aspects of a Magecart attack is that they can go undetected for days, weeks or even months, increasing the scale of the Data Breach as they go.
In addition to this, we have a selection of features and tools detailed below that will help you get started with CSP and work through to enforcing a policy across your whole site, but please reach out to email@example.com if you need more information.
Because Script Watch leverages the browser native Content Security Policy, there is no code or agent to deploy and running in the browser means we analyse your site in real-time as your users are browsing. We don't have the same limitations as external scanning services such as authentication or pay walls, geo-sensitive content or an attacker potentially serving safe content to the crawler.
Data Watch will monitor all of the locations that your webpages are sending data to. If your website starts sending data to a new location, it could be the start of a Magecart attack.
We often find that creating a CSP is the first difficult step that organisations face. Having a complete list of all resource dependencies across your entire site like images, scripts or styles, from both 1st-party and 3rd-party locations, is tough to achieve.
The CSP Wizard was created to solve this problem, and in seven days or less, it can you give a complete list of all resources used across your entire site.
With the list of all resources you use on your site, and our easy to use tool, creating a viable Content Security Policy is easier than ever with just a few clicks.
All Content Security Policies will need to be tweaked at some point. New resources may be added to the site or old resources removed, and the policy needs to be updated to reflect those changes and kept up to date.
You can import your existing policy into the CSP Builder and use our fully featured tool to make any changes that you require right there in the UI. When you're done, hit Generate, and the CSP Builder will provide you with your new, updated policy.
Script Watch and Data Watch will allow you to rapidly detect and respond to a Magecart attack and combined, that capability puts you ahead of the field. If you want to take it a step further, Content Security Policy can mitigate a Magecart attack and stop it from even happening.
We subscribe to various feeds of Threat Intelligence data, along with managing our own internally generated feeds, to keep apprised of the latest threats that exist online.