Learn How Digital Skimmers Affect the Marketplace
The Ticketmaster hack revealed in Summer 2018 seems like just the latest in a long line of security breaches. What stands out here is a script used by the hackers, commonly known as Magecart.
Chargeacks911 COO Monica Eaton offered her insight on the topic for Kiosk Marketplace. In her brilliant post, Monica explained how the Magecart.js script works, why hackers are relying on this tool to pull-off attacks, and how eCommerce businesses can protect themselves.
What is Magecart?
“The script essentially works like a card skimmer installed on a physical card terminal,” Monica explains. “By injecting the malicious script, hackers can steal payment information in real time during checkout. The information is then relayed over to a collection server run by the criminal.”
Monica also points out that the script isn’t hard to disable. What makes it so dangerous is the fact that attackers work through a third-party. Instead of targeting the merchant directly, they go for a service provider who works with the merchant and has access to the merchant’s systems.