Posted in

导航第三方 JavaScript 集成风险_AI阅读总结 — 包阅AI

包阅导读总结

1. 关键词:JavaScript、Third-Party Integrations、Risks、Cybercriminals、Security Measures

2. 总结:本文探讨了 JavaScript 第三方集成带来的风险,包括恶意攻击获取数据的方式,如数字窃取、网络供应链攻击等,并提到从支付卡行业吸取的教训及客户端保护的重要性,强调企业需改进安全措施以应对。

3. 主要内容:

– JavaScript 重要性与第三方集成:74%企业认为选择合适框架关键,JavaScript 是网络关键支柱,助企业快速集成第三方服务,但引入新风险。

– 网络犯罪获取数据的方式:

– 数字窃取、表单劫持和 Magecart 攻击,通过注入未经授权的代码窃取敏感信息。

– 网络供应链攻击,罪犯通过注入或操纵恶意代码入侵第三方标签。

– 像素数据泄露和个人可识别信息采集。

– 支付卡行业的教训:PCI 标准专注于卡数据安全,v4 版有管理支付页面 JavaScript 的新规则。

– 客户端保护:PCI 标准和现有技术如 CSP、SRI 存在不足,需要客户端保护和合规解决方案,以控制第三方 JavaScript 行为,实现安全创新。

思维导图:

文章地址:https://thenewstack.io/navigating-the-risks-of-third-party-javascript-integrations/

文章来源:thenewstack.io

作者:Rui Ribeiro

发布时间:2024/7/30 16:30

语言:英文

总字数:1077字

预计阅读时间:5分钟

评分:83分

标签:JavaScript 安全,网络安全风险,Web 开发,数据保护,PCI DSS


以下为原文内容

本内容来源于用户推荐转载,旨在分享知识与观点,如有侵权请联系删除 联系邮箱 media@ilingban.com

Earlier this year, research from digital reference library DataReportal found that internet users between the ages of 16 and 64 spend an average of 6 hours and 40 minutes consuming the internet. A new generation of online destinations is serving more engaging and interactive experiences than the static sites of yesteryear, which means they can hold a consumer’s attention for extended periods.

According to research from PixelCrayons, 74% of businesses consider choosing the proper framework crucial for success in the digital age. JavaScript is one of the critical pillars of the internet. After more than two decades, JavaScript remains as relevant and impactful as ever.

Thanks to JavaScript, these businesses can easily and quickly integrate third-party services and transform their online businesses. For an online merchant, this means adding shopping carts, chatbots, payment gateways, and product filtering analytics tracking, none of which require writing any code.

However, this innovation introduces new risks. First, it requires companies to add third-party scripts to their websites. Next, businesses involuntarily allow those third-party scripts to have unmonitored and uncontrolled access to forms and data anywhere on the page. And that’s not all. They can also be easily viewed and manipulated, which creates vulnerabilities that malicious actors can easily exploit to access sensitive information (PII, payment card data, etc.) and valuable company content.

Here Are Some of the Ways That Cybercriminals Can Access This Data

Digital Skimming, Formjacking, and Magecart Attacks

These attacks pose significant threats to websites employing both first- and third-party JavaScript. In each case, the cybercriminal injects unauthorized JavaScript code to steal sensitive information from website forms, such as credit card details. The unauthorized scripts are sophisticated, mimicking legitimate functionalities and skillfully evading detection.

In the case of Magecart attacks, these target e-commerce platforms by injecting skimming scripts onto payment pages. These scripts exploit prevalent third-party integrations often found on e-commerce websites. When third-party services are utilized, the attack surface expands dramatically, heightening the risk. Magecart attacks raise substantial concerns as they can operate stealthily for prolonged periods, which gives attackers a significant amount of time to steal data before they are detected and shut down.

One high-profile example of a Magecart attack happened in 2018 with Ticketmaster. In this instance, attackers gained access to systems through a third-party customer support product and then inserted malicious code on Ticketmaster’s website payment pages. From there, attackers gained access to customer credit cards. Overall, 40,000 customers were impacted.

Web Supply Chain Attacks

Web Supply Chain Attacks are sophisticated cyberthreats in which criminals compromise third-party tags by injecting or manipulating malicious code within the solution provider’s JavaScript code. A recent example is the polyfill.io incident, which impacted anywhere from 110,000 to several million websites.

In a typical scenario, once the compromised elements are loaded onto a website or application, the malicious code executes within the user’s browser, posing various security threats such as data breaches, unauthorized access to sensitive information, or hijacking user sessions.

These attacks exploit the complex web of services and dependencies that modern websites rely on. A breach in a single third-party service can grant an attacker access to multiple websites or applications connected to that service. As these attacks leverage trusted third-party website add-ons, they often evade traditional security measures and prove challenging to detect.

Pixel Data Exfiltration

Advertising and social media tags, also known as pixels, can cause harm if misconfigured or if they capture data in unauthorized areas of a business’s website. These tags are meant to help enterprises to better target customers by collecting data on user interests so advertisers or social networks can target each user with relevant ads. However, if left unchecked, they can potentially gather confidential information, posing risks to your business and customers.

PII Harvesting

PII (Personally Identifiable Information) harvesting via JavaScript occurs when malicious actors exploit vulnerabilities in JavaScript code to extract sensitive user information from websites. These attacks often target forms, user inputs, or cookies manipulated with JavaScript injections. By infiltrating the client-side code, hackers can siphon data such as names, addresses, email IDs, credit card details, and other personal information users enter. This illicit collection of PII poses a severe threat to user privacy and can lead to identity theft, financial fraud, and other malicious activities.

Lessons Learned From the Payment Card Industry

When taking action, a great place to begin is with the Payment Card Industry Security Standards Council (PCI SSC). Created more than 20 years ago by American Express, Discover Financial Services, JCB International, Mastercard, and Visa, PCI SSC has dedicated itself to adopting data security standards and resources that will help secure payments worldwide.

PCI DSS v4, which became the only active version of the standard in March 2024, focuses on cardholder data and ensuring that it is handled, stored, and transmitted securely when transactions occur. It also features new rules for managing JavaScript on payment pages to prevent skimming attacks.

Going the Distance With Client-Side Protection

While the PCI standard is a great starting point, it alone is insufficient. The same can be said about available technology options, such as Content Security Policy (CSP) and Sub-Resource Integrity (SRI). CSP and SRI are valuable, but more is needed, especially when monitoring first- and third-party JavaScript.

  • CSP lacks control over executed code in the browser and requires extensive manual configuration and maintenance.
  • SRI doesn’t monitor or protect against runtime behavior changes or attacks that originate from trusted third parties.

These shortcomings fuel the need for client-side protection and compliance solutions to facilitate the implementation of standardized, state-of-the-art code obfuscation for all internally developed JavaScript throughout the product life cycle, from development to runtime.

Client-side protection and compliance solutions also address another critical need of businesses using first — and third-party JavaScript. To avoid security breaches, teams need control over all third-party tags’ JavaScript behavior. This control must span the entire business and include control over data consumption by third-party tags. They must also be able to rapidly cover all website pages and identify all third-party tags without impacting the website’s performance. Client-side protection and compliance solutions deliver on both fronts.

The explosion of digital innovation enabled by JavaScript opens many doors for businesses. However, they must also evolve their security measures to transform their websites. By adopting client-side solutions, these businesses can freely innovate while protecting revenue and reputation and achieving regulatory compliance.

YOUTUBE.COM/THENEWSTACK

Tech moves fast, don’t miss an episode. Subscribe to our YouTubechannel to stream all our podcasts, interviews, demos, and more.

GroupCreated with Sketch.