Overview
Syllabus
Intro
Background - Script Inclusion diagram
Magecart: Digital supply-chain attack
Statistics - The data
30,000+ vulnerable assets
Popularity of affected sites
Cross-sector
Steal information
Active abuse
Threat model - Careful hacker
The enterprise challenges
Anti-Magecart solutions
General notes about the careful hacker
General things that careful hackers do
Bypass script monitoring
Bypass client-side solutions
Use browser native mechanisms
Enterprise use of browser native mechanisms
The Trusted-Source Injection (TSI) attack
Scriptless Magecart attack
Summary table: Enterprise vs. Hackers
What could be done?
Taught by
Black Hat