Profile

Cover photo
60 followers|114,367 views
AboutPostsPhotosYouTube

Stream

Foregenix

Shared publicly  - 
 
In a previous article we discussed an interesting evolution we were seeing in the eCommerce security arena, that of asymmetric encryption techniques being used to obfuscate harvested payment card data. This is something that became prevalent many years prior with binary malware created for brick and mortar compromises.

The past couple of weeks we have come across the dropper and instalment components of this same Malware. Read more on our blog.

http://bit.ly/1SmzzC6
1
Add a comment...

Foregenix

Shared publicly  - 
 
Does your website use a payment redirect?

We've found new Malware that overcomes outsourced payment pages.

Read more on our blog.

http://bit.ly/1Q383bw #dfir
1
1
Kirsty Trainer's profile photo
Add a comment...

Foregenix

Discussion  - 
 
Magento Alert - Malicious Client Side Javascript

The latest alert from our forensic team - a recent spate of Magento websites have been compromised via Shoplift and had some very clever malware loaded into the website's database.

Magento has the ability to render content directly from the database and this situation means attackers can push malicious code into an eCommerce website that never actually "touches the disk" directly. As a result, the compromise can evade "normal" checks for unusual activity.

The malware we've recently seen is Javascript - an executable code that would run in the consumer's browser and monitor form fields - collecting payment card data - and of course, any personally identifiable information that goes with the payment card data to help them complete fraudulent transactions elsewhere.

This is a HIGHLY effective attack and renders the "safety net" of using an outsourced payment page (hosted payment page) completely ineffective at protecting the valuable payment card data.

To view sample code and search strings, please visit:

http://blog.foregenix.com/magento-malware-alert-malicious-client-side-javascript

#magento #malware #javascript #cybersecurity
1
Add a comment...

Foregenix

Magento How To  - 
 
Magento Alert - Malicious Client Side Javascript

The latest alert from our forensic team - a recent spate of Magento websites have been compromised via Shoplift and had some very clever malware loaded into the website's database.

Magento has the ability to render content directly from the database and this situation means attackers can push malicious code into an eCommerce website that never actually "touches the disk" directly. As a result, the compromise can evade "normal" checks for unusual activity.

The malware we've recently seen is Javascript - an executable code that would run in the consumer's browser and monitor form fields - collecting payment card data - and of course, any personally identifiable information that goes with the payment card data to help them complete fraudulent transactions elsewhere.

This is a HIGHLY effective attack and renders the "safety net" of using an outsourced payment page (hosted payment page) completely ineffective at protecting the valuable payment card data.

To view sample code and search strings, please visit:

http://blog.foregenix.com/magento-malware-alert-malicious-client-side-javascript

#magento #malware #javascript #cybersecurity
1
Add a comment...

Foregenix

Tech Talk  - 
 
Magento Alert - Malicious Client Side Javascript

The latest alert from our forensic team - a recent spate of Magento websites have been compromised via Shoplift and had some very clever malware loaded into the website's database.

Magento has the ability to render content directly from the database and this situation means attackers can push malicious code into an eCommerce website that never actually "touches the disk" directly. As a result, the compromise can evade "normal" checks for unusual activity.

The malware we've recently seen is Javascript - an executable code that would run in the consumer's browser and monitor form fields - collecting payment card data - and of course, any personally identifiable information that goes with the payment card data to help them complete fraudulent transactions elsewhere.

This is a HIGHLY effective attack and renders the "safety net" of using an outsourced payment page (hosted payment page) completely ineffective at protecting the valuable payment card data.

To view sample code and search strings, please visit:

http://blog.foregenix.com/magento-malware-alert-malicious-client-side-javascript

#magento #malware #javascript #cybersecurity
1
Add a comment...

Foregenix

Shared publicly  - 
 
With hundreds of Magento-hosted e-businesses at risk from fraudulent hackers through the use of rogue Magento plugins, our online website security scanner has confirmed nearly 5% of over 1,000 websites tested have been compromised.

Read more & scan your site for free.

http://bit.ly/1kVmUrk
1
Add a comment...
Have them in circles
60 people
Andrey Rogozhin's profile photo
neville ogilvie's profile photo
Site Musica total's profile photo
Kirsty Trainer's profile photo
[Ubertheme] complimentary Extensions in Magento Theme's profile photo
Verifone's profile photo
Muhammad Faisal's profile photo
Wicus Ross's profile photo
Mandy Pattenden's profile photo

Foregenix

Shared publicly  - 
 
3 new partners now offer FGX-Web to protect their clients' e-commerce websites.

http://bit.ly/1Ooc1WF
1
Add a comment...

Foregenix

Web Development  - 
 
Magento Alert - Malicious Client Side Javascript

The latest alert from our forensic team - a recent spate of Magento websites have been compromised via Shoplift and had some very clever malware loaded into the website's database.

Magento has the ability to render content directly from the database and this situation means attackers can push malicious code into an eCommerce website that never actually "touches the disk" directly. As a result, the compromise can evade "normal" checks for unusual activity.

The malware we've recently seen is Javascript - an executable code that would run in the consumer's browser and monitor form fields - collecting payment card data - and of course, any personally identifiable information that goes with the payment card data to help them complete fraudulent transactions elsewhere.

This is a HIGHLY effective attack and renders the "safety net" of using an outsourced payment page (hosted payment page) completely ineffective at protecting the valuable payment card data.

To view sample code and search strings, please visit:

http://blog.foregenix.com/magento-malware-alert-malicious-client-side-javascript

#magento #malware #javascript #cybersecurity
1
Add a comment...

Foregenix

Discussion  - 
 
Magento Alert - Malicious Client Side Javascript

The latest alert from our forensic team - a recent spate of Magento websites have been compromised via Shoplift and had some very clever malware loaded into the website's database.

Magento has the ability to render content directly from the database and this situation means attackers can push malicious code into an eCommerce website that never actually "touches the disk" directly. As a result, the compromise can evade "normal" checks for unusual activity.

The malware we've recently seen is Javascript - an executable code that would run in the consumer's browser and monitor form fields - collecting payment card data - and of course, any personally identifiable information that goes with the payment card data to help them complete fraudulent transactions elsewhere.

This is a HIGHLY effective attack and renders the "safety net" of using an outsourced payment page (hosted payment page) completely ineffective at protecting the valuable payment card data.

To view sample code and search strings, please visit:

http://blog.foregenix.com/magento-malware-alert-malicious-client-side-javascript

#magento #malware #javascript #cybersecurity
1
Add a comment...

Foregenix

Thảo luận  - 
 
Magento Alert - Malicious Client Side Javascript

The latest alert from our forensic team - a recent spate of Magento websites have been compromised via Shoplift and had some very clever malware loaded into the website's database.

Magento has the ability to render content directly from the database and this situation means attackers can push malicious code into an eCommerce website that never actually "touches the disk" directly. As a result, the compromise can evade "normal" checks for unusual activity.

The malware we've recently seen is Javascript - an executable code that would run in the consumer's browser and monitor form fields - collecting payment card data - and of course, any personally identifiable information that goes with the payment card data to help them complete fraudulent transactions elsewhere.

This is a HIGHLY effective attack and renders the "safety net" of using an outsourced payment page (hosted payment page) completely ineffective at protecting the valuable payment card data.

To view sample code and search strings, please visit:

http://blog.foregenix.com/magento-malware-alert-malicious-client-side-javascript

#magento #malware #javascript #cybersecurity
1
Add a comment...

Foregenix

Shared publicly  - 
 
The "Key" to Secure Data - PCI P2PE - Derived Unique Key Per Transaction (DUKPT)

The encryption key infrastructure usually used in PCI P2PE solutions is based on the DUKPT (pronounced duck-putt) model. This key hierarchy was initially designed by Visa in 1987 and is documented in ANSI x9.24. DUKPT means Derived Unique Key Per Transaction and means that every transaction is protected using a different encryption key such that compromise of a single encryption key will not compromise the overall solution.

Read more on our blog to find out how this works in a PCI P2PE solution.

http://blog.foregenix.com/p2pe-derived-unique-key-per-transaction-dukpt

#PCI #P2PE #payments #cybersecurity
1
Add a comment...

Foregenix

Tech Talk  - 
 
Credit Card Hijack

Our forensic team have just wrapped up a forensic investigation on an e-commerce business that has had a considerable number of customer data stolen – including credit card data. The attack involved a malicious Javascript – recently announced by Magento on the 16th November 2015.

Find out more info on our website.

http://blog.foregenix.com/credit-card-hijack-magento-javascript-alert

#magento #cybersecurity
Our forensic team have just wrapped up a forensic investigation on an e-commerce business that had had a considerable number of customer data stolen – including credit card data. The attack involved a malicious Javascript – recently announced by Magento on the 16th November 2015.
1
Add a comment...
Story
Tagline
Security Specialists - focus on Forensics, PCI Compliance and protective security solution development.
Introduction
Foregenix is an independent, specialised information security business, headquartered in the United Kingdom, with regional offices in South Africa, Argentina and Uruguay - our clients range geographically from Russia to Argentina and many countries in between.  

We specialise in the following areas:
Our solutions are designed to simplify and improve security for businesses:


We're passionate about security and securing our clients!
Contact Information
Contact info
Phone
+44 845 309 6232
Email
Address
First Floor, 8-9 High Street, Marlborough, Wiltshire, SN8 1AA, United Kingdom