• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cyberattacks targeting e commerce applications

Cyberattacks Targeting E-commerce Applications

You are here: Home / General Cyber Security News / Cyberattacks Targeting E-commerce Applications
August 28, 2023

Cyber attacks on e-commerce apps are a frequent craze in 2023 as e-commerce enterprises turn into more omnichannel, they construct and deploy increasingly additional API interfaces, with danger actors constantly discovering additional strategies to exploit vulnerabilities. This is why normal testing and ongoing checking are essential to entirely shield web applications, identifying weaknesses so they can be mitigated immediately.

In this post, we will examine the current Honda e-commerce platform attack, how it took place, and its impression on the enterprise and its purchasers. In addition, to the great importance of application security testing, we will also focus on the distinct regions of vulnerability tests and its numerous phases.

Ultimately, we will give particulars on how a lengthy-time period preventative remedy such as PTaaS can guard e-commerce businesses and the distinctions amongst continual testing (PTaaS) and normal pen screening.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The 2023 Honda E-commerce System Attack

Honda’s energy machines, lawn, yard, and maritime solutions commerce system contained an API flaw that enabled any individual to ask for a password reset for any account.

The vulnerability was observed by researcher Eaton Zveare who a short while ago found a significant security flaw in Toyota’s supplier portal. By resetting the password of bigger-level accounts, a risk actor was offered with admin-stage details access on the firm’s network with out restriction. If found out by a cybercriminal, this would have resulted in a large-scale information breach with large ramifications.

Zverare mentioned: “Broken/lacking obtain controls created it attainable to entry all information on the system, even when logged in as a take a look at account.”

This permitted the tester to entry the subsequent information and facts:

  • Nearly 24,000 buyer orders throughout all Honda dealerships from August of 2016 to March of 2023 this incorporated the customer’s identify, handle, and phone number.
  • 1,091 active supplier internet websites with the means to modify these internet sites.
  • 3,588 seller consumers/accounts – like individual aspects.
  • 11,034 buyer e-mail – like very first and final names.
  • 1,090 vendor email messages.
  • Inner economical reviews for Honda.

With the previously mentioned information, cybercriminals could conduct a range of functions, from phishing campaigns to social engineering attacks and selling information and facts illegally on the dark web. With this level of entry, malware could also be put in on vendor internet sites to try to skim credit rating cards.

How Was The Vulnerability Discovered

On the Honda e-commerce system, “powerdealer.honda.com” subdomains are assigned to registered sellers. Zveare discovered that the password reset API on one particular of Honda’s web-sites, Power Products Tech Convey (PETE), was processing reset requests devoid of necessitating the former password.

A legitimate email handle was uncovered through a YouTube movie that presented a demo of the supplier dashboard applying a take a look at account. At the time reset, these login credentials could be utilised on any Honda e-commerce subdomain login portal, providing accessibility to internal dealership info.

Next, the tester desired to entry the accounts of true dealers without having the risk of detection and with out needing to reset the passwords of hundreds of accounts. To do this, Zveare found a JavaScript flaw on the system, the sequential assignment of consumer IDs, and a deficiency of access security. As these kinds of, are living accounts could be observed by incrementing the consumer ID by a single right up until there were not any other final results.

Last but not least, the platform’s admin panel could be totally accessed by modifying an HTTP response to make it seem as if the exploited account was an admin.

On April 3, 2023, Honda reported that all the bugs experienced been fastened following the results were in the beginning noted to them on March 16, 2023. Eaton Zveare obtained no monetary reward for his work as the firm does not have a bug bounty plan.

The Importance of E-commerce Software Security Screening

E-commerce application security testing is essential to shield the individual and money data of anyone joined to the application, such as clients, sellers, and vendors. The frequency of cyberattacks on e-commerce applications is superior, meaning suitable protection is essential to avert facts breaches that can seriously destruction the popularity of a enterprise and result in economic decline.

Regulatory compliance in the e-commerce sector is also stringent, with facts security becoming organization-critical to keep away from economic penalties. An application requires extra than just the hottest security characteristics, just about every component demands to be analyzed and best techniques followed to develop a strong cybersecurity strategy.

Cyber Threats For E-commerce Applications

  • Phishing – Phishing is a sort of social engineering attack that aims to trick victims into clicking a link to a destructive internet site or software. This is finished by sending an email or textual content that is built to glimpse as if it has been sent from a reliable supply, these kinds of as a bank or do the job colleague. Once on the malicious site, buyers may well enter facts these kinds of as passwords or account numbers that will be recorded.
  • Malware/ Ransomware – When contaminated with malware, a selection of routines can consider area on a procedure, this sort of as locking people today out of their accounts. Cybercriminals then talk to for payment to re-grant obtain to accounts and programs – this is regarded as ransomware. However, there is a wide range of malware that execute diverse actions.
  • E-Skimming – E-skimming steals credit card information and own information from payment card processing web pages on e-commerce sites. This is obtained through phishing attacks, brute pressure attacks, XSS, or probably from a third-party site staying compromised.
  • Cross-Website Scripting (XSS) – XSS injects destructive code into a webpage to target web end users. This code, normally Javascript, can report consumer enter or watch webpage action to get sensitive information.
  • SQL Injection – If an e-commerce application suppliers facts in an SQL databases, then an SQL injection attack can enter a malicious query that permits unauthorized accessibility to the database’s contents if it is not effectively guarded. As effectively as remaining able to look at details, it could also be feasible to manipulate it in some instances.
  • The Unique Spots of Vulnerability Testing

    There are ordinarily 8 critical locations of vulnerability tests, and their methodology can then be damaged down into 6 phases.

    8 Areas of Vulnerability Testing

    • Web Software-Dependent Vulnerability Assessment
    • API-Primarily based Vulnerability Evaluation
    • Network-Primarily based Vulnerability Assessment
    • Host-Dependent Vulnerability Assessment
    • Actual physical Vulnerability Assessment
    • Wireless Network Vulnerability Assessment
    • Cloud-Based mostly Vulnerability Assessment
    • Social Engineering Vulnerability Evaluation

    The 6 Phases of Vulnerability Assessment Methodology

  • Ascertain critical and higher-risk property
  • Carry out a vulnerability assessment
  • Perform vulnerability assessment and risk assessment
  • Remediate any vulnerability – E.G., implementing security patches or fixing configuration issues.
  • Evaluate how the method can be improved for optimal security.
  • Report the results of the assessment and the actions taken.
  • Pentesting As A Provider (PTaaS)

    Penetration Screening as a Service (PTaaS) is a delivery platform for common and price tag-efficient penetration testing although also boosting collaboration concerning tests providers and their customers. This enables companies and corporations to detect vulnerabilities much more regularly.

    PTaaS vs. Regular Pen Testing

    Conventional penetration screening is completed on a contractual foundation and generally will take a important amount of time. This is why this form of testing can only be done at the time or 2 times a yr. PTaaS, on the other hand, permits ongoing testing, even as usually as just about every time code is changed. PTaaS performs ongoing, authentic-time assessments utilizing a mix of automated scanning instruments and guide techniques. This supplies a much more ongoing solution to security requirements and fills in the gaps that happen with annual screening.

    Click listed here to master extra about the added benefits of PTaaS by requesting a dwell demo of the SWAT platform made by Outpost24.

    Summary

    Cyberattacks on e-commerce internet websites happen regularly, and even platforms constructed by global businesses this sort of as Honda have contained critical vulnerabilities that have been learned in the previous 12 months.

    Security tests is essential to assess the whole attack floor of an e-commerce application, guarding the two the small business and its users from cyber attacks like phishing or e-skimming.

    Penetration tests as a provider is 1 of the best approaches to secure platforms, carrying out frequent scans to provide constant vulnerability assessments so they can be mitigated as shortly as possible.

    Observed this article appealing? Abide by us on Twitter  and LinkedIn to examine a lot more exceptional articles we submit.


    Some components of this posting are sourced from:
    thehackernews.com

    Previous Post: «kmsdbot malware gets an upgrade: now targets iot devices with KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced Capabilities
    Next Post: Developers Beware: Malicious Rust Libraries Caught Transmitting OS Info to Telegram Channel developers beware: malicious rust libraries caught transmitting os info to»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
    • Top 10 Best Practices for Effective Data Protection
    • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
    • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
    • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
    • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
    • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
    • Pen Testing for Compliance Only? It’s Time to Change Your Approach
    • 5 BCDR Essentials for Effective Ransomware Defense
    • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

    Copyright © TheCyberSecurity.News, All Rights Reserved.