SBN

Protection against Magecart with new Instart Web Skimming Protection for Salesforce Commerce Cloud

Salesforce Commerce Cloud, also known as Demandware, is used by some of the worlds largest brands for marketing, customer interaction, and to process online shopping transactions. Given the importance of the platform, and the sensitivity of the data it handles, it is a popular target for criminals, such as Magecart groups.

Magecart attacks

Web skimming attacks, such as those perpetrated by the criminal Magecart groups, happen when malicious JavaScript is injected into web pages responsible for processing customer data — for example shopping cart checkout pages as this is where credit card numbers are entered.

Attackers will target eCommerce servers and inject their code, where it will be delivered to customers’ browsers in conjunction with the first party website content — this is exactly what happened last week to retailer Sweaty Betty when a JavaScript file delivered by their Commerce Cloud implementation was breached. 

The challenges with these types of attacks is the bad code sits there silently, undetected, stealing customer information as it is entered into the web pages. Because the attack payload only performs its malicious activity in the customer’s browser, it is often weeks or months before it is discovered, during which hundreds of thousands of customers have their information stolen.

Learn more about Magecart web skimming attacksExplore the threat

Web skimming protection

Once malicious JavaScript is injected into a webpage and delivered to a customer it has unlimited access to any and all information entered by customers, including form data, credit card numbers, cookies and local storage. Web browsers do not implement any security barriers around which data can be read by JavaScript leaving pages and information, potentially vulnerable to theft.

Web skimming protection acts as a barrier between your web page, the data customers enter into it, and any JavaScript running, whether legitimate, or injected maliciously. If code attempts to read sensitive fields such as a credit card number and the code has not been approved to access such data, the attempt is rejected and the organization is alerted.

When an organization is a victim of a Magecart attack and web skimming code is injected, instead of unknowingly having customer data exfiltrated for weeks or months, the attacked JavaScript would be blocked from accessing data fields and cookie information and the organization would immediately be alerted to the malicious activity. For organizations, this simple protection avoids loss of revenue, significant brand damage, lawsuits or privacy compliance penalties, and a myriad of other ramifications from such an attack.

Instart Web Skimming Protection for Salesforce Commerce Cloud

Instart Web Skimming Protection for Salesforce Commerce Cloud has been specifically adapted for Commerce Cloud and Demandware customers making implementation and integration seamless and simple. With this solution, Commerce Cloud organizations can protect themselves, and their customers, from Magecart and other web skimming attacks.

Instart has invested significant effort into ensuring that its web skimming protection components work within the Commerce Cloud environment, that customers can realize the security benefits without having to change workflow or operations, and that it protects against these increasing common Magecart attacks.

Get started with a Magecart protection solution in less than 24 hours. Get a FREE 30-day trial


*** This is a Security Bloggers Network syndicated blog from Instart blog RSS authored by Natalie Lambert. Read the original post at: https://www.instart.com/blog/web-skimming-protection-commerce-cloud

Secure Guardrails