sb-nz logo
Story image

Ticketmaster breach part of massive digital credit card skimming campaign

12 Jul 2018

The recent breach of Ticketmaster was not a one-off event as initially reported, but part of a digital credit card-skimming campaign by the threat group Magecart affecting over 800 e-commerce sites around the world.

Digital threat management company RiskIQ revealed these findings in a report by its researchers today.

According to Ticketmaster’s official statement, the breach impacted Ticketmaster International, Ticketmaster UK, GETMEIN! and TicketWeb from February 2018 until June 23rd of 2018, but RiskIQ researchers found evidence the skimmer was active on additional Ticketmaster websites including Ireland, Turkey, and New Zealand since as early as December 2017.

The report highlights how Magecart has evolved tactically from hacking sites directly, to now targeting widely used third-party components.

This approach grants them access to even more victims - sometimes 10,000 or more instantly.

According to RiskIQ researchers, Magecart likely breached the systems of Inbenta and SociaPlus, both third-party suppliers integrated with Ticketmaster websites, and added to or replaced custom javascript modules with their digital credit card skimmer code.

Like physical skimmers that criminals hide in compromised POS machines, gas pumps, and ATMs, digital card skimmers steal credit card data from unwitting customers via scripts injected into e-commerce websites to record the credit card data they enter into online payment forms.

RiskIQ has been tracking Magecart’s activities since 2015 and studying how its credit card skimming attacks have been continuously ramping up in frequency, sophistication, and impact.

RiskIQ researchers found that other suppliers, web analytics provider PushAssist, CMS Clarity Connect, Annex Cloud, and likely many others, were also compromised by the Magecart actor.

RiskIQ has been tracking a highly-targeted Magecart campaign dubbed SERVERSIDE, which has used access to these third-party components to claim over a 100 top-tier victims including some of the world's largest online brands.

RiskIQ threat researcher Yonathan Klijnsma says, "While Ticketmaster received the publicity and attention, the Magecart problem extends well beyond them."

"We believe it's cause for far greater concern. Magecart is bigger than any other credit card breach to date and isn’t stopping any day soon.”

Many of the publicly reported breaches are wrongly interpreted as individual events but are in reality part of the SERVERSIDE campaign, and often not individual breaches at all.

RiskIQ researchers also found that the Command and Control server used in the Ticketmaster attack has been active since December 2016.

Story image
ThreatQuotient hits $22.5m in new financing, continues growth streak
“Since we first invested in ThreatQuotient in 2017, their team has continued to prove to the market that there is a critical need for cybersecurity solutions aimed at security operations."More
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More
Story image
Ransomware and Microsoft Exchange attacks surging 
There are global surges in ransomware attacks alongside increases in cyber attacks targeting Microsoft Exchange Server vulnerabilities, according to Check Point Research.More
Story image
AvePoint brings Salesforce Cloud Backup to channel partners
The product adds to the AvePoint suite of trusted Cloud Backup for Microsoft 365 and Dynamics 365 to provide managed service providers with backup and restore capabilities across multiple, popular SaaS providers.More
Story image
Microsoft Exchange breach a wake-up call to ditch the server
"There are owners who still have in-house exchange servers because they are suspicious of the cloud or have concerns about their data sovereignty or don't want to contemplate the capital expenditure. But the warning is clear. Get rid of them."More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More