PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Web Skimming: The Solarwinds Hack That Targets Merchant Sites and Consumer Card Data

By Tim Sloane
February 4, 2021
in Analysts Coverage, Commercial Payments, Credit, Data, Debit, Emerging Payments, Fraud & Security, Merchant, Real Time Payments, Security, Supply Chain
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
A Crypto Exchange Hacked Here, Another There: Do You Know Where Your Crypto Is Tonight?

A Crypto Exchange Hacked Here, Another There: Do You Know Where Your Crypto Is Tonight?

The SolarWinds hack was devastating and used trusted third party software to penetrate its targets. Magecart does exactly the same.  Criminals embed their code into script used by merchants. When the merchants update the script they get infected. This article describes the difficulty of detecting and preventing these attacks:

“Magecart attacks are unlike anything that online retailers have faced before. They can inject malicious code into a website without ever touching the website’s server. Instead, they often use a web supply chain attack, injecting the skimmer into a third-party service (e.g., live chat, analytics tool, website plug-in, etc.). Then, the skimmer starts being served by the target website, intercepting the website’s payment form (hence, why it’s also known as “formjacking”) and sending the stolen credit card data to attackers’ drop servers.

I’ve directly interacted with the security teams of several retailers, and one thing is clear: while the vast majority are aware of Magecart, they often turn to approaches like using a content security policy (CSP). In theory, CSP seems like a good candidate: it restricts the scripts that are allowed to load on the website and restricts sending data only to whitelisted domains. However, it can be bypassed.

Research shows that 94 percent of CSPs based on whitelists are bypassable. But even if we ignore that fact, one of the key issues with CSP is that it lacks granularity. If a domain is whitelisted by CSP, any type of data can be sent to that domain, even if it’s credit card data or personally identifiable information (PII). Then, there’s also the problem of maintenance, as making sure that CSP works as intended is a time-consuming manual process, especially given that e-commerce websites are evolving with the frequent addition of new external scripts.

These are just some of the many pitfalls of CSP. Sooner or later, security teams understand it isn’t suitable for addressing Magecart attacks.

Instead, because web skimming attacks are so particular and have so many nuances, they require a dedicated approach. I’ve long advocated that the most effective answer to Magecart attacks is focusing on client-side malicious behavior. A script’s attempts to touch a payment form or send data out to an unvetted domain are clear examples of potentially malicious behavior, and one that’s present in nearly every Magecart attack. If we’re able to detect this malicious behavior in real time and block it, we can block Magecart attacks, whether they’re using known approaches or new ones.

Overview by Tim Sloane, VP, Payments Innovation at Mercator Advisory Group

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: Consumer DataCredit CardCybercrimeHackersSolarwindsSupply Chain

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    embedded payments

    Embedding Payments for Growth: How ISVs Can Scale Through Vertical Focus and Partnerships

    March 31, 2026
    ACH fraud monitoring

    From a Checkbox to a Differentiator: Redefining ACH Fraud Monitoring

    March 30, 2026
    Digitization and Multi-Brand Cards: Prepaid Trends. Bancorp Bank prepaid card fees, Bitpay Prepaid Card, mobile prepaid debit cards, prepaid cards for councils

    Turning a Prepaid Card into a Long-Term Relationship

    March 27, 2026
    payments fraud, faster payments fraud, financial fraud

    The Emotional Toll of Financial Fraud

    March 26, 2026
    hyperliquid

    What Hyperliquid Reveals About the Future of Trading

    March 25, 2026
    Modernizing Payments modernizaion

    Modernizing Payments: Tackling the Toughest Tech Challenges

    March 24, 2026
    fintech bank data

    The Growing Data Battle Between Banks and Fintechs

    March 23, 2026
    7 Fabulous AI Chatbot Trends for Small Business, AI chatbots in business, chatbots instant gratification millennials

    What Banking Customers Want—and Don’t Want—From Chatbots

    March 20, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2026 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result