Last Updated Jun 05, 2020 — Application Security expert
Application Security

On the surface, the breaches that impacted British Airways, Ticketmaster and Forbes seem like any other cyberattack: a bad actor finds a security hole and exploits it. And while the headlines may not appear unique, the fact that Magecart style attacks continue to succeed at breaching the websites of global companies without being detected is costing millions of dollars in fraudulent credit card charges and government penalties.

New research conducted by advisory firm Aite Group revealed that 100% of the eCommerce  websites examined were not protected — making them easy prey for Magecart attacks. Even more startling is the fact that it took only 2.5 hours of research to uncover the 80 compromised sites. Among the other notable findings:

  • All of the compromised websites use an outdated version of Magento which is vulnerable to formjacking and digital card skimming
  • None of the websites used appropriate in-app protection capabilities such as code obfuscation and tamper detection
  • 25% of the sites were large brands in motorsports and luxury retail

Download the full report to learn more about the methods and techniques Magecart groups use to conduct digital card skimming and formjacking, and the security measures you can deploy to protect your website and your customers.

 

Are you ready to scale your enterprise?

Explore

What's New In The World of Digital.ai

April 4, 2023

Monitor Threats to Your Apps with Digital.ai App Aware

Discover how to monitor threats for desktop, web, and mobile apps that you put out “into the wild” with this blog that delves deep into the features and capabilities of Digital.ai App Aware.

Learn More
March 29, 2023

Intro to the World of Virtualization – Part II

Read on to understand the potential for application virtualization to be used as an attack vector.

Learn More
March 28, 2023

Intro to the World of Virtualization – Part I

Read on to understand the potential for application virtualization to be used as an attack vector.

Learn More