Rootconf Pune edition

On security, network engineering and distributed systems

The Art of Exfiltration : Digital Skimming

Submitted by Arjun BM (@arjunbm) on Jul 4, 2019

Section: Crisp talk (20 mins) Category: Security Status: Confirmed & Scheduled

Abstract

The explosion of online digital e-commerce platforms has triggered a race for customer acquisition which no retailer wants to lose or be left out of. As businesses look to deliver faster, easier and better services, security has always been an important factor in the customer value-chain. E-commerce websites continue to be lucrative targets to threat actors, who seek to compromise sensitive guest information. Several high-profile data breaches of ecommerce sites in 2018 has once again forced security researchers to don their thinking hats. New threat actors and vectors are emerging, making online shopping a riskier proposition. While not sacrificing customer experience, how can businesses stay safe in a highly competitive and ever-changing environment? What can be done to safeguard customer data and promote online shopping confidence?
A “digital skimmer” is a malicious JavaScript code embedded into checkout page of hacked websites, to capture payment information of customers. The talk provides an introduction to digital skimming and its recent history, highlighting why this poses high risk to businesses. The workflow of digital skimming operations uncovers how stolen data is monetized in underground markets. The talk will next explore various threat actors involved and attack techniques employed in this type of attack. Diving deeper into code will provide insights into the nuts and bolts of a digital skimmer. Digital skimming being a complex threat, has various challenges in understanding and dealing with it. Lastly, we will look at various counter-measures that can be implemented to reduce the risk of digital skimmers, which can help protect customer data and brand reputation.

Outline

Digital skimming is a threat which many CISOs admit, keeps them up at night. This talk is a comprehensive analysis, articulated from a rare combination of theoretical understanding and applied practical experience of this threat. The real-life hands-on operational experience the speaker has had in dealing with this threat is invaluable information. The talk is crisp, concise and purposeful - focused at providing key take-aways to the audience and equipping them with the capability to strengthen security controls within their own organization.

INTRODUCTION TO DIGITAL SKIMMING
WHAT IS A DIGITAL SKIMMING ATTACK?
MODUS OPERANDI OF THE ATTACK
THREAT ACTORS AND ATTACK VECTORS
ANATOMY OF A DIGITAL SKIMMING ATTACK
CHALLENGES IN DEALING WITH THIS ATTACK
COUNTERMEASURES AND REMEDIATION STEPS
CONCLUSION

Speaker bio

Arjun is a Lead Information Security Analyst at Target Corporation. He is a security professional with diverse experience in architecting, designing, implementing & supporting IT Security & Vulnerability Management solutions in Enterprise & Cloud environments. He is an information security enthusiast with diverse experience in areas like Application Security, Security Architecture, DevSecOps, Cloud Security & Machine Learning. Currently, Arjun is working as a Security Analyst ensuring end-to-end implementation, design and governance of security measures for Target’s Digital & Marketing e-commerce platforms, aimed at brand protection and improving guest confidence. He has been closely following the digital skimming threat and is actively involved within his organization to research upon and ensure that defenses are in place to counter this threat.

Slides

https://www.slideshare.net/ArjunBM3/root-conf-digitalskimmingv4arjunbm

Preview video

https://www.youtube.com/watch?v=lEC2_NVq9sI

Comments

{{ errorMsg }}

You need to be a participant to comment.

Login to leave a comment