Experts Comments On Hackers Steal Card Details From Thousands Of Volusion Sites

By   ISBuzz Team
Writer , Information Security Buzz | Oct 09, 2019 05:53 am PST

Hackers have breached the infrastructure of Volusion, a provider of cloud-hosted online stores, and are delivering malicious code that records and steals payment card details entered by users in online forms.

More than 6,500 stores are impacted, but the number could be even higher. In a press release published last month, Volusion claimed it had more than 20,000 customers. The most notable compromise is the Sesame Street Live online store, which has been taken down earlier today after another journalist reached out. At the time of writing, the malicious code is still on Volusion’s servers and is still being delivered to all of the company’s client stores.

Experts have commented on the breach below:

Notify of
3 Expert Comments
Oldest Most Voted
Inline Feedbacks
View all comments
Felix Rosbach
Felix Rosbach , Product Manager
October 9, 2019 2:02 pm

The times of “we are just a small store – hackers won’t target us” are over. Payment card details are extremely valuable data sets as fraud is easy to commit with stolen card information. When hackers are able to breach cloud-based platforms – like Volusion in this case – they gain access to a huge amount of data sets by targeting hundreds of stores with a single attack.

Last edited 4 years ago by Felix Rosbach
Tim Erlin
Tim Erlin , VP of Product Management and Strategy
October 9, 2019 2:00 pm

Thousands of organizations have offloaded the work and the risk for processing eCommerce transactions to third parties like Volusion. The concentration of credit card data in one place makes for an attractive target.

Data shows that since the introduction of EMV or chip cards, fraud has actively moved from card-present to card-not-present, or from the point of sale systems to online eCommerce. We’ve made it harder, though not impossible, to create counterfeit cards, and criminals have shifted their attention to easier avenues of attack.

Last edited 4 years ago by Tim Erlin
Javvad Malik
Javvad Malik , Security Awareness Advocate
October 9, 2019 1:56 pm

Compromising the supply chain is a common tactic used by many attackers. We\’ve seen many attacks over the years that look to inject malicious code into trusted settings, such as into mobile phone App stores, WordPress plugins, or other widgets. This attack against Volusion follows the same methodology where by compromising the infrastructure, all underlying sites and users become vulnerable.

It\’s unclear how the Google services of Volusion were compromised, but it reinforces the fact that no type of company is immune from attacks and therefore need to ensure security is embedded throughout the culture of every company.

Last edited 4 years ago by Javvad Malik

Recent Posts

Would love your thoughts, please comment.x