Magecart Prevention Solution

Intelligent client-side protection for your ecommerce website from Magecart and other online skimming and client-side attacks

Your website is a target for Magecart and other criminals who utilize online skimming attacks to steal your customer data. Ensighten is the leader at mitigating Magecart attacks with our products used to protect the world most valuable brands. 

Unlike other solutions, Ensighten's technology is not driven by legacy signature-based mitigation approaches, but instead utilizes modern, cutting edge browser-based detection to prevent attacks from taking place. 

Solution highlights

Network whitelisting
Prevents all data from leaving the web page except to approved destinations regardless of the Magecart technique used 
Intelligent analysis
Identifies specific types of data, such as credit card numbers and social security numbers, and prevents transmission to unknown destinations
Performant and lightweight
SaaS-delivered technology from highly scalable cloud infrastructure protects your website while maintaining the very best user experience
Modern  filtering
Stops emerging Magecart attack methods, including mutating resources, form replacement and image injection
Real-time analytics and reporting
Monitors all network requests and provides visibility into attack attempts, alerting you to potential issues
Comprehensive user interface
Allows easy configuration, rapid onboarding and low-maintenance protection

Comprehensive protection

Magecart attackers are constantly adapting their methodologies, leveraging the complexity of the browser to find new ways to exfiltrate data. Our solutions evolves with them and currently enables protection against the following website attacks:

icon-computer-blue
JavaScript injection
icon-unlock-blue
Magecart
icon-group-blue
Third-party vendor exploitation
icon-hacker-blue
CSS injection
icon-person-blue
Client-side keylogging
icon-globe-blue
Formjacking
icon-browser-blue
Web skimming
icon-code-blue
Tag piggybacking
icon-warning-blue
Man-in-the-browser

How we compare

  

Ensighten  

Other Magecart protection solutions 

Standard website protections 

JavaScript injection mitigation

Also known as online skimming protection, web skimming protection and formjacking protection. Prevents data from being stolen through malicious code which has been injected into JS libraries which are used within websites  

Yes  

Yes  

Limited 

CSS injection mitigation

Prevents data from being stolen through CSS injection techniques, including brute-forcing stuffing

Yes  

Limited 

Limited 

Form replacement mitigation

Prevents attackers from replacing forms, such as check-out forms, with fake data-stealing forms by utilizing components such as iFrames 

Yes  

No  

No 

Malicious ad injection prevention

Prevents malicious ads being injected into websites through exploited components or through rogue browser extensions

Yes  

No  

No 

Network whitelisting

Prevents data from being transmitted from a web page to remote locations other than those specifically defined in a whitelist 

Yes  

No  

No 

Full event-loop reporting 

Provides comprehensive reporting regarding client-side attack protection, including attempted and mitigated attacks 

Yes  

Limited 

No 

Simple setup and configuration

Allows organizations to configure the solution simply by keeping configuration requirements to a minimum but still delivering a secure application 

Yes 

Limited 

No

Performant-focused solution

Ensures that website performance is not affected by the implementation of an additional security layer 

Yes  

Caution

Caution 

 

What are Magecart attacks?

Magecart is an umbrella term given to a collection of distinct hacker groups who utilize online skimming techniques to steal customer credit card information from ecommerce websites. The criminal groups are known for successful breaches against some of the world's most well-known brands.

While the origins of the Magecart groups are subject to debate, the name was given to them based on their original targets: websites utilizing Magento, a common third-party technology which retailers use on their sites to provide shopping cart and checkout functionality.

Mitigating Magecart attacks

With vulnerabilities being discovered and published constantly, along with a high usage of third-party resources, organizations are unable to eliminate the online skimming and Magecart threat. For many, once the methods of Magecart are understood, the assumption is not if an attack happens, but when and how they can react.  

The only solution to preventing online skimming is to prevent attackers from being able to exfiltrate data from your website. By implementing a whitelist of trusted and validated network locations, should a third-party library be breached, the attackers would be unable to extract any customer data. 

Victims large and small

No retailer is safe from Magecart and their skimming malware has been found on the websites of small boutique stores to online, global giants. Different groups within the Magecart collective do have their own preferences when it comes to targets, but these targets change depending on known and available attack avenues at the time.  

Small organizations make easy targets for Magecart as they tend to adopt less stringent security measures or even make use of cheaper ecommerce platforms to provide their online stores. While such organizations are seen as low-hanging fruit, larger entities offer greater rewards to criminals and are often just as easy to breach.  

The risk of third-party libraries

Before online skimming code can be injected into a website and delivered to a user’s browser, a breach must occur allowing website files to be modified. There have been numerous incidents where Magecart has breached the infrastructure of an organization and injected their malicious skimming code directly onto a site but more often than not the hackers will target one of the third parties or subsystems utilized within the website.  

By targeting a third-party provider, Magecart hackers achieve two distinct results; the first being that they do not have to break into an organization’s  infrastructure, therefore circumventing any security that they have put in place, and the second being that they can target any and all retailers utilizing the same third party.

With the average organization making use of between 40-60 third party libraries within their website, Magecart have a large and vulnerable attack surface to target. For many businesses, their security investments lie in protecting their origin or source, with them not realizing that their use of third-party technologies can make them open to attacks such as online skimming. 

Prevent Magecart attacks

Get in contact for a no obligation conversation to learn more about Magecart and other client-side attacks, and how you could be vulnerable to data leakage
Contact us