3 Months after Ticketmaster Attack, Breached Tools Still in Use on Over 1000 websites
About Source Defense
We provide the ONLY prevention solution for malicious activity originated from website supply chain vendors, Learn more on how it works.
Ticketmaster UK revealed in June the theft of personal data for over 40,000 of its UK customers to a website credit card skimming campaign called Magecart that has so far in total victimized 800+ online merchants and counting. The widespread success of this attack campaign and its ongoing nature is evidence of the universal susceptibility of every website to this attack vector. Further, the impacts have ripple effects. Just recently, New Zealand’s Westpac bank reissued 30,000 cards based on suspicious transactions linked to Ticketmaster payments.
These types of attacks are particularly effective because site owners rely on third party tools for essential elements of the user experience as well as critical analytics. Eliminating the capabilities these tools provide – even those that could potentially pose a threat – comes at the massive and often unacceptable cost of reduced performance. Third party tools have become essential to most modern websites.
The categories of exposed sites are also concerning. Shopping, telecom, and finance sites are heavily represented. These categories are particularly attractive to hackers given the volume of payment and financial data these sites transact.