A 'shadow' lurks that could make data breaches even worse

Register now

Client-side data breaches are a major risk to organizations in the era of stronger data privacy regulations such as CCPA.

A recent attack on the American Payroll Association’s websites affected not only the payment page but also the login page, resulting in theft of usernames and passwords.

The APA is an attractive target for Magecart attackers since their members have access to tools and systems that contain payroll data for millions of individuals. The attackers can brute-force other payroll systems using the same stolen credentials to find other account takeover targets.

Digital skimming and Magecart attacks take advantage of Shadow Code in websites introduced via third-party scripts, open source libraries or third-party plugins for content management systems. This Shadow Code, introduced without formal approvals or security validation, can expose websites to client-side attacks leading to data breaches and compliance violations.

Businesses must take steps to manage the Shadow Code risks by applying timely security patches and upgrading vulnerable open source libraries and third-party plugins.

In addition, client-side application security solutions can provide full run-time visibility and control over all scripts and prevent client-side data breaches. Businesses must encourage consumers to use unique passwords and multifactor authentication for different websites to minimize the risk of account takeover (ATO) attacks, and must continue to monitor their credit reports for signs of identity fraud.

For reprint and licensing requests for this article, click here.
Data breaches Risk Payment fraud Cyber security