Content, Breach, Channel partners, Content

Ticketmaster Data Breach Part of Global Payment Card Hacking Campaign

Ticketmaster was one of more than 800 e-commerce companies affected by a global digital credit card-skimming campaign launched by the Magecart cyberattack group, according to cyber threat intelligence firm RiskIQ.

With the Ticketmaster cyberattack, Magecart hackers installed digital credit card-skimming malware in a customer support software component from Inbenta Technologies, an external third-party supplier for Ticketmaster, RiskIQ indicated. Then, the hackers captured payment card data that was entered into forms on Ticketmaster's websites and sent this information to a remote server.

In addition to Ticketmaster's websites, Magecart hackers have installed digital credit card-skimming software on third-party components and services used by other e-commerce sites, including:

  • Annex CloudOffers customer loyalty, referral marketing and user-generated content (UGC) solutions.
  • Clarity ConnectProvides a content management system (CMS) designed to help users create an online presence with a website or web store.
  • PushAssistEnables users to send push notifications from a website to subscribers' mobile devices.

Magecart has been operational since 2015 and plagues e-commerce sites worldwide, RiskIQ stated. Furthermore, Magecart hackers are refining their tactics and techniques, and organizations must prepare accordingly.

Are Payment Card Breaches Becoming Commonplace?

Many globally recognized brands have identified payment card breaches this year, including:

  • Chili's Grill & Bar: Malware was used to obtain Chili's customers' payment card information, including credit and debit card numbers and cardholder names, from the restaurant chain's payment-related systems for in-restaurant purchases.
  • Applebee's: Malware was discovered and removed on Applebee's point-of-sale (POS) systems across nearly 170 restaurant locations.
  • Saks Fifth Avenue and Lord & Taylor: Malware was used to obtain Saks Fifth Avenue and Lord & Taylor customers' bank card numbers from the companies' POS systems.

Seventy-two percent of retailers do not have a security breach response plan in place or have a plan in place that has not been tested, according to a recent survey conducted by advanced threat detection solutions provider Tripwire and technology market research firm Dimensional Research. However, MSSPs can help retailers and other organizations prepare for malware, ransomware and other cyberattacks.

MSSPs can offer cybersecurity training and insights to help organizations plan for cyberattacks. Plus, MSSPs can deliver endpoint, network and other security services that enable organizations to address rapidly evolving cyber threats.

Dan Kobialka

Dan Kobialka is senior contributing editor, MSSP Alert and ChannelE2E. He covers IT security, IT service provider business strategies and partner programs. Dan holds a M.A. in Print and Multimedia Journalism from Emerson College and a B.A. in English from Bridgewater State University. In his free time, Dan enjoys jogging, traveling, playing sports, touring breweries and watching football.