Cheney Bros Card Skimming Attack – Expert Insight

Cheney Bros, Inc., the 10th largest food distributor in the U.S., had one of its sites hacked and retrofitted with code that steals credit card and login data leveraging a new domain that easily hides in a hacked site’s source code.

Experts Comments

March 13, 2020
Deepak Patel
Security Evangelist
PerimeterX
The Magecart threat continues to thrive. With businesses often leveraging third-party platforms and scripts to enhance the website user experience, the rise of such digital skimming attacks will continue. Businesses are unable to detect data breaches stemming from Magecart attacks in time because they occur on the client-side where most businesses have no visibility into changes in third-party code. PerimeterX research shows that Magecart attacks often remain active on websites for weeks or.....Read More
The Magecart threat continues to thrive. With businesses often leveraging third-party platforms and scripts to enhance the website user experience, the rise of such digital skimming attacks will continue. Businesses are unable to detect data breaches stemming from Magecart attacks in time because they occur on the client-side where most businesses have no visibility into changes in third-party code. PerimeterX research shows that Magecart attacks often remain active on websites for weeks or even months, compromising hundreds of thousands of credit card numbers in the process. The value of the skimmed credit card information is much higher since the full data package of address, name, zip code and CVV code is captured.  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.