123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Experts Identify New Malware Targeting Users Of E-commerce Websites

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Cybercriminals use different techniques to compromise computers and steal confidential information. Recently, security researchers at Trend Micro identified a new malware that targets users of e-commerce websites. Cybercriminals first compromise websites by inserting an iframe. When users visit the compromised sites, some of the URLs on these sites cause several redirections, which ultimately result in exploitation of several vulnerabilities. Attackers exploit vulnerabilities associated with RDS.Dataspace, Java Deployment Toolkit, Adobe Reader and Java Runtime environment. Exploitation of the vulnerabilities allow attackers to either cause denial of service, execute arbitrary code or affect availability, confidentiality and integrity and redirect users to another web address, which downloads a malware detected as TROJ_JORIC.BRU. Once downloaded on the computer systems, the malware attempts to capture login credentials, credit card details and other confidential information and send them to a remote website. After gaining access to the required information, the malware deletes itself to avoid detection. Cybercriminals may use ...
... extracted information to gain unauthorized access to online shopping and banking accounts, conduct unauthorized transactions or even create fake accounts by using the identity of the victims. They may also use the accessed credit card details to develop counterfeit credit cards. Attackers also sell the stolen data to their peers in the underground cybercrime market.

According to the security firm, the attack has affected over 90,000 web pages, which use osCommerce solutions. While users face the risk of compromising sensitive personal and financial data, business face the risk of disruption in business operations resulting in financial loss or loss of productive business hours. Security professionals must update their technical skills and expertise through distance learning and online university degree programs to tackle the sophisticated attacks emanating in the IT environment.

Organizations must regularly scrutinize their websites to detect iframe, SQL injection and other web-based vulnerabilities. Professionals qualified in penetration testing, secured programming and computer science degree programs may help organizations in timely assessment of security threats, detection and mitigation of vulnerabilities before their exploitation by cybercriminals. They must have proper patch management policy in place to track and implement requisite security updates.

Internet users must regularly scan their computer systems with updated security software to detect, block and remove Trojans and viruses. They must update their computer software and adhere to the guidance and advisories provided by developers, Internet security firms and computer emergency response teams. Internet users may benefit from online degree and learning programs to acquaint themselves of security threats and improve online computing practices.

Total Views: 246Word Count: 409See All articles From Author

Add Comment

Computers Articles

1. What Identity Governance Really Means In Modern Enterprises
Author: Mansoor Alam

2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates

3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma

4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions

5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights

6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point

7. Spark Matrix™: Data Governance Solutions
Author: Umangp

8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david

9. Naming Development & Management
Author: brainbell10

10. Mysql Database Development & Management Services
Author: brainbell10

11. Mongodb Development & Management
Author: brainbell10

12. Spark Matrix™: Conversational Automation
Author: Umangp

13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK

14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams

15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: