Learn How Digital Skimmers Affect the Marketplace
The Ticketmaster hack revealed in Summer 2018 seems like just the latest in a long line of security breaches. What stands out here is a script used by the hackers, commonly known as Magecart.
Chargeacks911 COO Monica Eaton-Cardone offered her insight on the topic for Kiosk Marketplace. In her brilliant post, Monica explained how the Magecart.js script works, why hackers are relying on this tool to pull-off attacks, and how eCommerce businesses can protect themselves.
What is Magecart?
“The script essentially works like a card skimmer installed on a physical card terminal,” Monica explains. “By injecting the malicious script, hackers can steal payment information in real time during checkout. The information is then relayed over to a collection server run by the criminal.”
Monica also points out that the script isn’t hard to disable. What makes it so dangerous is the fact that attackers work through a third-party. Instead of targeting the merchant directly, they go for a service provider who works with the merchant and has access to the merchant’s systems.