Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Wednesday September 19 2018, @10:15PM   Printer-friendly
from the rotten-egg dept.

Newegg has been hacked (archive). If you bought anything on Newegg.com between August 13th and September 18th, get a new credit card:

Newegg is investigating a data breach that may have compromised credit card details and other information about its customers, though the full extent of the damage is not yet known.

"Yesterday, we learned one of our servers had been injected with malware which may have allowed some of your information to be acquired or accessed by a third party," Newegg CEO Danny Lee states in an email being sent out to potentially affected customers." The malware was quite sophisticated and we are conducting extensive research to determine exactly what information may have been acquired or accessed and how many customers may have been impacted."

[...] Researchers from RiskIQ and Volexity say the attackers installed credit card skimming malware onto Newegg's website. They injected the malicious code into Newegg's payment processing page, basically hiding in plain site for more than a month, the researchers say.

The stolen credit card data was then sent to a drop server on a domain the hackers had registered, initially parked at neweggstats.com. They obtained a security certificate for the site from Comodo so that it appeared legitimate.

takyon: A news search for "Newegg" finds numerous examples of PC Gamer directing its readers to the site for deals (and steals?) during the breach period.

Also at Ars Technica and The Verge.

Previously: Encryption Patent That Roiled Newegg is Dead on Appeal
Newegg Is Being Sued for Allegedly Engaging in Massive Fraud


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Interesting) by DarkMorph on Thursday September 20 2018, @02:40AM (1 child)

    by DarkMorph (674) on Thursday September 20 2018, @02:40AM (#737353)
    Here's an idea. Host all the JS on the domain (in other words, eliminate the risk of contaminated 3rd party content from loading and running) and enable the Content-Security-Policy header [mozilla.org] to ban any inline JS or 3rd party domain references to JS assets. Even without any other XSS mitigation techniques, these two design choices should make it extremely hard if not impossible outright to conduct such an attack.

    If that plan has a hole in it, do correct me. Interested ears are listening.

    By the way, the same code was used against British Airways just recently before this.
    Starting Score:    1  point
    Moderation   +3  
       Interesting=3, Total=3
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by takyon on Thursday September 20 2018, @04:04AM

    by takyon (881) <takyonNO@SPAMsoylentnews.org> on Thursday September 20 2018, @04:04AM (#737379) Journal

    The credit card companies won't allow it. There's your hole.

    --
    [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]