POPULARITY
Credit card skimming is growing in popularity. Gas pumps all over are seeing skimmers attached to them. It’s growing in popularity because it’s really effective. Hackers have noticed how effective it is and have began skimming credit cards from websites. Guest Thanks to Yonathan Klijnsma from RiskIQ. Yonathan has fallen on hard times and could use your help GoFundMe Link. Sponsors This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2019 to get a $20 credit on your next project. Support for this episode comes from Honeybook. HoneyBook is an online business management tool that organizes your client communications, bookings, contracts, and invoices – all in one place. Visit honeybook.com/darknet to get 50% off your subscription. This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo. Visit darknetdiaries.com for full show notes and transcripts. Learn more about your ad choices. Visit megaphone.fm/adchoices
Hear how consumers can avoid online payment card-skimming (Magecart), in this interview with Yonathan Klijnsma of RiskIQ. Full post: https://defendingdigital.com/how-to-avoid-online-card-skimming-interview-with-yonathan-klijnsma-riskiq/
Dennis Fisher talks with Yonathan Klijnsma of RiskIQ about his new research into Magecart Group 4, the background and tactics of the web skimming group, and how the defender community responds through takedowns and other techniques.Read the RiskIQ report here.Read our coverage of Magecart here.
The shutdown continues to cause problems for the federal government's cybersecurity operations. In our interview, we talk with Yonathan Klijnsma about Magecart. If there is a guy to talk to about Magecart, he's the guy. Obviously the reason we talked to him. Nothing gets by us.
Magecart - a web-based credit card skimming kit used by various groups to grab ahold of online shoppers credit cards. Interesting? You bet! On this episode of the Purple Squad Security podcast I have Yonathan Klijnsma, Head Researcher at RiskIQ, joining me to discuss their research on Magecart.Some links of interest: Inside Magecart Report - https://cdn.riskiq.com/wp-content/uploads/2018/11/RiskIQ-Flashpoint-Inside-MageCart-Report.pdf Ticketmaster breach - https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/ British Airways breach - https://www.riskiq.com/blog/labs/magecart-british-airways-breach/ Newegg breach - https://www.riskiq.com/blog/labs/magecart-newegg/ Vision Direct with admin skimming - https://www.riskiq.com/blog/labs/magecart-vision-direct/ Other Magecart Articles - https://www.riskiq.com/blog/category/magecart/ RiskIQ Website - https://www.riskiq.com/ Krebs on Security Skimming Article - https://krebsonsecurity.com/all-about-skimmers/ Want to reach out to the show? There's a few ways to get in touch! Purple Squad Security's Twitter: @PurpleSquadSec John's Twitter: @JohnsNotHere John's Mastodon: https://infosec.exchange/@JohnsNotHere Podcast Website: purplesquadsec.com Patreon - https://www.patreon.com/purplesquadsec Sign-Up for our Slack community: https://signup.purplesquadsec.com Thanks for listening, and as always, I will talk with you all again next time.Find out more at http://purplesquadsec.com
Researchers at RiskIQ have been tracking a series of web-based credit card skimmers known as Magecart. We take a closer look at attacks on Ticketmaster, British Airways, NewEgg and Shopper Approved payment card pages. Yonathan Klijnsma is lead of threat research at RiskIQ, and he guides us through what they've learned. Links to RiskIQ research: https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/ https://www.riskiq.com/blog/labs/magecart-british-airways-breach/ https://www.riskiq.com/blog/labs/magecart-newegg/ https://www.riskiq.com/blog/labs/magecart-shopper-approved/ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.
RiskIQ (https://www.riskiq.com) , leading threat response and analysis efforts with the help of RiskIQ's expansive data set. Both his work and hobbies focus on threat intelligence in the form of profiling threat actors as well as analyzing and taking apart the means by which digital crime groups work. Outside of work Yonathan likes taking things apart and figuring out how they work; be it physical devices or digital like malware or ransomware. He is a regular presenter at industry conferences such as Krebs on Security (https://krebsonsecurity.com/tag/yonathan-klijnsma/) to name a few. In this episode we discuss his start in information security, his current security research, Magecart, web application security, website asset management, supply chain security, and so much more. Where you can find Yonathan: LinkedIn (https://www.linkedin.com/in/ydklijnsma/) Twitter (https://twitter.com/ydklijnsma) RiskIQ Blog (https://www.riskiq.com/blog/labs/magecart-british-airways-breach/) GitHub (https://github.com/0x3a)
Threatpost editor Lindsey O’Donnell talks to RiskIQ's threat researcher, Yonathan Klijnsma, about the varying groups under the Magecart umbrella, and the differing characteristics, targets and techniques of these growing number of groups.