Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Security threats in the retail sector

admin by admin
Dec 22, 2022
in ICS-SCADA
A A
0

The success of any retail business is directly dependent on its customers, and any incident that harms customers will have repercussions for business. Confidence in a retailer can be shaken by incidents like bank card details being stolen and used to extract funds from customers’ accounts, as well as by visible disruption to the store’s operation and the failure to deliver purchased goods. Loss of customer confidence in an online store equates to loss of income and potential bankruptcy for the business.

Another important factor in the success of any business is financial stability, and unpredictable financial losses are among the most harmful consequences of cyberattacks. Retailers face their own specific financial risks: for example, an attacker can reduce the price of expensive goods in an online store. If the attack goes unnoticed and the retailer sells and ships the goods at the reduced price, the company will lose money.

The most typical consequences of cyberattacks on retailers are:

  • Financial losses
  • Reputational damage
  • Fines
  • Lawsuits from customers

Some typical attacks on retailers and their potential consequences are illustrated below.


Figure 2. How cyberattacks affect retailers

Let’s examine the two most damaging types of security incident for retailers: data theft and sales disruption.

Data theft

According to our research, 70% of attacks on retailers in 2021 targeted sensitive information. The most frequently targeted information was personal data (32% of stolen information), bank card details (21%), customer databases (13%), and intellectual property (13%). Attackers were able to obtain this information simply by hacking the company’s website or gaining access to its internal network.

{point.name}
n {y:,.0f}%“},”startAngle”:0,”center”:[null,null],”showInLegend”:true},”column”:{“colorByPoint”:false},”bar”:{“colorByPoint”:false},”series”:{“borderRadius”:8,”dataLabels”:{“enabled”:true,”format”:”{y:,.0f}%“}}},”series”:[{“name”:”2020″,”color”:”#ff9999″,”marker”:{“enabled”:true,”symbol”:”circle”},”dashStyle”:”Solid”,”data”:[{“name”:”Access to data”,”y”:90},{“name”:”Financial gain”,”y”:22},{“name”:”Hacktivism”,”y”:4}]},{“name”:”2021″,”color”:”#ff0000″,”marker”:{“enabled”:true,”symbol”:”circle”},”dashStyle”:”Solid”,”data”:[{“name”:”Access to data”,”y”:70},{“name”:”Financial gain”,”y”:54},{“name”:”Hacktivism”,”y”:5}]}],”colors”:[“#ff0000″,”#ff3333″,”#ff6666″,”#ff9999″,”#ffcccc”,”#86c5ff”,”#53acff”,”#2094ff”,”#007aec”,”#0060b9″],”credits”:{“enabled”:true,”position”:{“verticalAlign”:”middle”,”align”:”right”,”x”:-5,”y”:95}},”tooltip”:{“enabled”:true,”shared”:true,”valueSuffix”:”%”},”exporting”:{“enabled”:true,”buttons”:{“contextButton”:{“verticalAlign”:”bottom”,”align”:”right”}}}}”>


Figure 3. Motives for attacks on retailers in 2021 (percentage of incidents)

{y:,.0f}%”},”startAngle”:0,”center”:[null,null],”showInLegend”:true},”column”:{“colorByPoint”:true},”bar”:{“colorByPoint”:true},”series”:{“borderRadius”:8,”dataLabels”:{“enabled”:true,”format”:”{y:,.0f}%“}}},”series”:[{“name”:”Процент”,”color”:””,”marker”:{“enabled”:true,”symbol”:”circle”},”dashStyle”:”Solid”,”data”:[{“name”:”Personal data”,”y”:32},{“name”:”Payment card data”,”y”:21},{“name”:”Customer databases”,”y”:13},{“name”:”Intellectual property”,”y”:13},{“name”:”Credentials”,”y”:11},{“name”:”Other”,”y”:10}]}],”colors”:[“#ff9999″,”#ffe066″,”#9c91d1″,”#5cffa1″,”#e2aac4″,”#64b4ff”,”#ff9999″,”#ff3333″,”#ff3333″,”#ff0000″,”#ff3333″,”#ff0000″,”#ff6666″,”#ff0000″,”#ff6666″,”#ff6666″,”#ff6666″],”credits”:{“enabled”:true,”position”:{“verticalAlign”:”bottom”,”align”:”right”,”x”:-5,”y”:-100}},”tooltip”:{“enabled”:true,”shared”:true,”valueSuffix”:”%”},”exporting”:{“enabled”:true,”buttons”:{“contextButton”:{“verticalAlign”:”bottom”,”align”:”right”}}}}”>


Figure 4. Types of data stolen in attacks on retail in 2021

In our Custom hacking services study, we analyzed adverts on dark web forums dedicated to website hacking services. We found that approximately 70% of posts soliciting hacking services were aimed at gaining access to websites. Not only can attackers steal sensitive information, they can also sell website access to dealers.

{y:,.0f}%”},”startAngle”:0,”center”:[null,null],”showInLegend”:true},”column”:{“colorByPoint”:true},”bar”:{“colorByPoint”:true},”series”:{“borderRadius”:8,”dataLabels”:{“enabled”:true,”format”:”{y:,.0f}%“}}},”series”:[{“name”:”Процент”,”color”:””,”marker”:{“enabled”:true,”symbol”:”circle”},”dashStyle”:”Solid”,”data”:[{“name”:”Gaining access to website”,”y”:9},{“name”:”Extracting customer databases”,”y”:21},{“name”:”Uploading malicious files”,”y”:4},{“name”:”Deleting information from website”,”y”:3},{“name”:”Programs for website hacking”,”y”:2},{“name”:”Searching for accomplices”,”y”:1}]}],”colors”:[“#64b4ff”,”#ff829a”,”#ffe066″,”#9c91d1″,”#ff6666″,”#7effb4″,”#53acff”,”#2094ff”,”#007aec”,”#0060b9″],”credits”:{“enabled”:true,”position”:{“verticalAlign”:”middle”,”align”:”right”,”x”:-5,”y”:95}},”tooltip”:{“enabled”:true,”shared”:true,”valueSuffix”:”%”},”exporting”:{“enabled”:true,”buttons”:{“contextButton”:{“verticalAlign”:”bottom”,”align”:”right”}}}}”>


Figure 5. Posts on dark web hacking forums by type

Online stores are of the greatest interest to attackers because they process card payments. Attackers can inject JavaScript code into a website to collect bank card details entered by customers.

Example attack: in the fall of 2020, more than 2,000 online stores based on CMS Magento were attacked using a zero-day vulnerability that enabled hackers to inject malicious code into the stores’ websites and steal customer’s bank card details. The group that first carried out the attack called itself Magecart. The technique proved so successful that many imitators soon appeared. Later the technique itself became known as a Magecart attack.

When attackers gain privileged access to an online store, they can steal databases and gain access to the personal accounts of its customers. Attackers can use stored card details to make purchases, or they can use vulnerabilities in the online store system to order goods without making any payment at all. Access to online stores is bought and sold for prices ranging between $50 and $2000.

Example attack: in April 2021, 895,000 gift certificates worth a total of $38 million were put up for sale on the dark web. The database contained certificates from 3,010 companies including Airbnb, Amazon, American Airlines, Chipotle, Dunkin’ Donuts, Marriott, Nike, Subway, Target, and Walmart. The gift card data is presumed to have been obtained in an attack on the online gift card store Cardpool. The entire database was sold for just $20,000.

In March 2022, data leaked from a Russian food delivery service was published on the internet. The leak contained names, phone numbers, and addresses of more than 6.8 million customers. It was later combined with information leaked from other sources, including online stores, traffic police, and other delivery services. The merged data was put online in a publicly accessible interactive map that provided access to personal information including phone numbers, passport details, social network pages, and vehicle details.

Another method used in attacks on retailers involves gaining access to the internal network of the target company and attacking from within, for example by infecting devices with malware, or accessing POS terminals or other internal resources. In 2021 we examined the vulnerability of corporate IT systems to external attacks. We found that attackers could access the internal network of every company we inspected.

Example attack: attackers stole credit card data belonging to 2 million customers of South Korean E-Land Retail by hacking into the company’s internal networks and installing malware on POS terminals. Over the course of a year they harvested data that could be used to clone credit cards that would be viable for making in-store purchases, and then executed a ransomware attack that led to the temporary closure of almost half the company’s stores.

Sales disruption: causes and consequences

Retailers lose income when attacks bring down online storefronts, ERP systems, payment terminals, and other infrastructure involved in making sales. Attackers can also disrupt the operation of warehousing and logistics systems, which can lead to the spoilage of perishable goods. A DDoS attack or website defacement might disrupt the operation of an online store, while a ransomware attack can have serious consequences for infrastructure. Our 2021 threatscape analysis found that 79% of malware attacks on retailers involved the use of ransomware.

Example attack: in the spring of 2021, Dutch warehousing and transport company Bakker Logistiek was hit by a ransomware attack that brought the company’s operations to a standstill. It was unable to accept orders, determine what goods were in storage or in what locations, or plan delivery routes. The incident led to an acute shortage of food products, especially cheese, in the largest Dutch supermarket chain Albert Heijn.

Preparedness is key to mitigating potential losses

Most threats in the retail sector are related to attacks on companies’ websites and infrastructure, or attacks on their customers that subsequently damage customer confidence. Either way, the result is the same: retailers risk fines, loss of income, theft of goods, and expensive repairs to their infrastructure. The threshold of acceptable risk is different for every organization.

In order to implement preventive security measures, companies need to identify the events (such as website unavailability, customer card theft, or online purchasing fraud) that would result in unacceptable consequences for them and thoroughly assess the risk of these events occurring. To do this, we recommend using a cyberrange. A cyberrange allows you to test scenarios of cyberattacks which lead to critical consequences (taking into account related business processes and systems), determine the criteria for their occurrence, assess the performance of security tools and anti-fraud systems, and then plan measures and actions to protect against cyberattacks and minimize their consequences.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.