123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Experts Identify New Malware Targeting Users Of E-commerce Websites

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Cybercriminals use different techniques to compromise computers and steal confidential information. Recently, security researchers at Trend Micro identified a new malware that targets users of e-commerce websites. Cybercriminals first compromise websites by inserting an iframe. When users visit the compromised sites, some of the URLs on these sites cause several redirections, which ultimately result in exploitation of several vulnerabilities. Attackers exploit vulnerabilities associated with RDS.Dataspace, Java Deployment Toolkit, Adobe Reader and Java Runtime environment. Exploitation of the vulnerabilities allow attackers to either cause denial of service, execute arbitrary code or affect availability, confidentiality and integrity and redirect users to another web address, which downloads a malware detected as TROJ_JORIC.BRU. Once downloaded on the computer systems, the malware attempts to capture login credentials, credit card details and other confidential information and send them to a remote website. After gaining access to the required information, the malware deletes itself to avoid detection. Cybercriminals may use ...
... extracted information to gain unauthorized access to online shopping and banking accounts, conduct unauthorized transactions or even create fake accounts by using the identity of the victims. They may also use the accessed credit card details to develop counterfeit credit cards. Attackers also sell the stolen data to their peers in the underground cybercrime market.

According to the security firm, the attack has affected over 90,000 web pages, which use osCommerce solutions. While users face the risk of compromising sensitive personal and financial data, business face the risk of disruption in business operations resulting in financial loss or loss of productive business hours. Security professionals must update their technical skills and expertise through distance learning and online university degree programs to tackle the sophisticated attacks emanating in the IT environment.

Organizations must regularly scrutinize their websites to detect iframe, SQL injection and other web-based vulnerabilities. Professionals qualified in penetration testing, secured programming and computer science degree programs may help organizations in timely assessment of security threats, detection and mitigation of vulnerabilities before their exploitation by cybercriminals. They must have proper patch management policy in place to track and implement requisite security updates.

Internet users must regularly scan their computer systems with updated security software to detect, block and remove Trojans and viruses. They must update their computer software and adhere to the guidance and advisories provided by developers, Internet security firms and computer emergency response teams. Internet users may benefit from online degree and learning programs to acquaint themselves of security threats and improve online computing practices.

Total Views: 179Word Count: 409See All articles From Author

Add Comment

Computers Articles

1. How To Improve The Security Of Android App?
Author: goodcoders

2. How To Earn Money From Free Apps?
Author: goodcoders

3. How Artificial Intelligence Is Revolutionizing Accounting?
Author: goodcoders

4. Explain About Web Application Architecture: Components, Types, Best Practices
Author: goodcoders

5. Complete Guide To Fitness App Development
Author: goodcoders

6. Erp For Small And Big Enterprise
Author: AITS Software

7. Top Software Development Company Melbourne
Author: Technothinksup Solutions

8. The Devops Revolution: Accelerating Innovation In The Digital Age
Author: basheer ansari shaik

9. How Ai Is Transforming Software Development
Author: Technothinksup Solutions

10. How To Do Web Scraping With Ruby?
Author: goodcoders

11. How Mobile Apps Blooming In The Fashion Industry?
Author: goodcoders

12. How Cloud Computing Helps In The Field Of Mobile App Development?
Author: goodcoders

13. The Importance Of Cybersecurity In The Digital Age
Author: Mohammad Arsh

14. First-ever ‘identity Management Day’ Is April 13, 2021
Author: Reinfosec

15. Top 5 Project Management Software Of 2025
Author: Ben Gross

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: