[ad_1]
Skimbende took over parts of the Ticketmaster websites, which allowed them to obtain credit card information. The gang took over a chatbot and marketing tool for this, and used this hacking method to penetrate more than 800 other websites.
This is demonstrated by the research of the American computer security company RiskIQ. The gang is called "Magecart" and has been monitored by RiskIQ since 2015.
"Ticketmaster has attracted all the attention, but Magecart's problem goes far beyond Ticketmaster," says RiskIQ's Dutch researcher Yonathan Klijnsma. . The criminals behind Magecart strike more often and succeed more and more, he warns.
Skimmen
Physical skimmers hide their equipment in cash machines, digital skimmers often work by taking over a website and injecting a script. This script tracks the type of credit card information that people enter on a website where you can order something.
At Ticketmaster, both a chatbot and a marketing tool were taken over by skimbende online. According to RiskIQ, criminals have most likely penetrated these parts deep into their systems. In the case of the Ibenta chatbotmaker, even the entire business may have been hacked.
Netherlands
The malicious script that stole the credit card data was also found by RiskIQ on other Ticketmaster sites, including Irish, Turkish, New Zealand and Australian sites. RiskIQ is currently investigating whether more Ticketmaster websites are infected.
It appeared earlier that the impact for the Netherlands is probably low: concert tickets are less often paid with credit cards. According to Ticketmaster, there is no indication that data from Dutch customers has also been stolen. As a precaution, all Dutch customers who bought a ticket between September 2017 and June 23, 2018.
Hacks
In addition to Ticketmaster, Magecart made more than 800 other victims. RiskIQ does not mention names, but claims that there are nearly a hundred major companies: mostly online stores of well-known brands. Customers who enter their payment information in these online stores run the risk of credit card fraud.
Criminals' strategy is also changing, says Kleinsma: instead of taking control of websites, they are now attacking third-party software used on many websites. Currently, PushAssist, a service that allows websites to send push messages, is taken over by Magecart. Their technology is used on over 10,000 websites.
How do you protect yourself against skimmers online?
It's very difficult because you usually do not know if a website has been taken over by online skimmers. To block this type of attack, you can use the NoScript plugin for Firefox or ScriptSafe for Chrome. Plugins can also destroy websites: in many cases, scripts are needed for the operation of a website.
[ad_2]
Source link