Formjacking involves the use of malicious JavaScript code to steal payment card details and other information from payment forms on the checkout web pages of e-commerce websites. Formjacking attacks have been used by Magecart threat group against e-commerce websites such as Ticketmaster, Newegg, Feedify, British Airways, etc.
Formjacking attacks are evolving since August 2018. Researchers detected nearly 250,000 formjacking attempts since mid-August 2018. Researchers from Symantec stated that they are blocking almost 6,368 formjacking attempts every day.
How does Formjacking work?
Who is Magecart group?
Magecart card-skimming threat group is comprised of 12 major cybercriminal groups. All these groups use the same skimmer toolset version, however, they depend on different tactics and techniques.
These threat groups were responsible for attacks against British Airways, Ticketmaster, the National Republican Senate Committee, Cancer Research UK, Feedify, Groopdealz, Everlast, Vision Direct, and Newegg.
What are the two main factors that allow Formjacking attacks?
There are two main factors that make these ‘Formjacking attacks possible’,
“There are two main factors that make these attacks possible: first, web apps are being developed without adequate attention to security and privacy, and, second, large companies are not using automated website vulnerability scanners or having white hat hacker teams assess their web app security against these breaches,” Chris Olson, CEO of The Media Trust, said.
How to stay protected from Formjacking attacks?
The websites onto which the malicious script has been injected continues to operate as normal, thus website owners cannot detect such attack attempts. However, they can take a few precautionary steps to stay protected from formjacking attacks such as,
Publisher