Original article published on ZDNet (07/10/18) by Zack Whittaker
The recent Ticketmaster breach was part of a much bigger credit card skimming operation, according to new analysis from RiskIQ. The firm estimates that at least 800 e-commerce sites were likely targeted, after accounting for code developed by third-party companies and later modified by hackers in a threat group called Magecart. Ticketmaster acknowledged that some customers had their payment data exposed because its website was running altered third-party code from Inbenta. Inbenta claimed that only Ticketmaster was affected, while Ticketmaster stated that only a few of its websites ran the tainted code. However, RiskIQ says this was only "the tip of the iceberg" when it determined that several of Ticketmaster's global sites, including its U.S. site, were hosting code from another third-party company that had also been compromised by Magecart. According to RiskIQ's Yonathan Klijnsma, the Magecart group "extends well beyond Ticketmaster," with findings that nearly 100 top-tier sites, including large brands and online shops, were involved in the skimming campaign.
Read the full story on the ZDNet website.