Shoppers across the globe make for easy cybercrime targets as they’re on the hunt for the hottest holiday online shopping deals of the year. But consumers aren’t the only ones at risk – Secureworks’ Senior Threat Researcher Rafe Pilling sees businesses at risk as well.
A main theme across holiday shopping cybercrime is the use of spam, phishing and malware ads. In order to get their targets’ attention, cybercriminals will lure workers into downloading unsecure files, a very similar technique seen throughout the COVID-19 pandemic into the holiday shopping season.
According to Pilling, the retailers themselves can also become targets, point-of-sale (PoS) malware and credit card skimming attacks are just two of the tools available to criminals, easily injecting harmful code into e-commerce websites.
“The COVID19 pandemic has resulted in a significant volume of purchases moving online in 2020, everything from online food shops, to everyday essentials, electronics and luxury goods. What we may see, like we saw with COVID-19, is cybercriminals pivoting to use holiday deals as a theme in spam, phishing, mal-vertising and other criminal cyber activity. It is often the theme, rather than the tempo of volume of criminal activity, that changes,” said Pilling.
“Online e-commerce operators are generally more exposed to a wider range of cyberattacks, however brick and mortar stores can also be targets for PoS skimming into e-commerce websites, colloquially know as Mage Cart attacks, has been another vector of criminal activity with some major retailers and travel companies being compromised over the years.
“For many organisations, the de-centralisation of the employee base (i.e. employees working from home), the reduction in reliance on centrally managed IT infrastructure through increased use of cloud services and employees using more of their own devices, has increased their resilience to certain types of cyberattack. It’s more difficult to conduct a wide-scale ransomware attack against an organisation whose users aren’t directly connected to the network and that uses multiple cloud service providers to deliver business systems. However, these changes come with their own risks that need to be carefully managed. Monitoring becomes more challenging. A greater emphasis is placed on identity and access management, ensuring only the right users can access the right systems. Additionally, as more companies use cloud services, from a relatively small pool of large cloud infrastructure providers, a lot of businesses and consumers notice when that cloud infrastructure has a temporary disruption.
“The situation is far from hopeless though. A few key controls like adopting multi-factor authentication, expedited patching of internet facing devices, securing remote access solutions, effective enterprise monitoring of systems and networks, and threat intelligence informed risk prioritization put businesses in a strong position to resist a range of common cyber threats including criminal ransomware attacks, business email compromise and targeted intrusions (APT).”