Incident: Magecart Attack on Volusion's Cloud Infrastructure Compromises Customer Credit Cards

Published Date: 2019-10-08

Postmortem Analysis
Timeline 1. The software failure incident, a Magecart attack on Volusion, happened this week as per the article [90763].
System 1. Volusion's servers [90763]
Responsible Organization 1. Hackers [90763]
Impacted Organization 1. Sesame Street Live online store 2. Official website for Bob Ross [Cited Article: <Article 90763>]
Software Causes 1. The software cause of the failure incident was a Magecart attack, where hackers inserted malicious code into Volusion's servers to steal credit card information from online customers [90763].
Non-software Causes 1. Lack of robust cybersecurity measures to prevent unauthorized access to sensitive data [90763] 2. Inadequate monitoring and detection systems to identify malicious activities on the servers [90763]
Impacts 1. Tens of thousands of online shoppers' credit card information may have been stolen [90763]. 2. Affected parties include the Sesame Street Live online store and the official website for Bob Ross [90763]. 3. The hack was classified as a Magecart attack, a type of hack that targets e-commerce websites to scrape and steal credit card information [90763]. 4. More than 18,000 online stores have been affected by similar Magecart attacks in recent months [90763]. 5. Magecart attacks can persist for extended periods, victimizing any visitor that makes purchases on the compromised site [90763].
Preventions 1. Implementing robust security measures such as regular security audits and penetration testing to identify vulnerabilities in the system [90763]. 2. Utilizing web application firewalls (WAFs) to monitor and filter HTTP traffic between a web application and the Internet to block malicious traffic and attacks [90763]. 3. Ensuring secure coding practices and regularly updating and patching software to address known vulnerabilities [90763]. 4. Educating employees and users about cybersecurity best practices to prevent phishing attacks and unauthorized access to sensitive information [90763].
Fixes 1. Implementing robust security measures such as regular security audits, penetration testing, and intrusion detection systems to detect and prevent unauthorized access to servers and data [90763]. 2. Enhancing server and website security by regularly updating software, patching vulnerabilities, and monitoring for any suspicious activities or unauthorized code injections [90763]. 3. Educating employees and users about cybersecurity best practices to prevent falling victim to phishing attacks or other social engineering tactics that could lead to breaches [90763].
References 1. ZDNet [90763] 2. MailOnline [90763] 3. Security firm RiskIQ [90763]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: - A similar incident to the hack on Volusion, where hackers stole credit card information, happened before at British Airways due to a Magecart attack [90763]. (b) The software failure incident having happened again at multiple_organization: - Magecart attacks, similar to the one on Volusion, have affected more than 18,000 online stores in the past few months, indicating that multiple organizations have been targeted by such attacks [90763].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be attributed to the hack on Volusion's servers, where hackers were able to steal credit card information by inserting malicious code into the system. This indicates a failure due to contributing factors introduced by system development or updates. The malicious code was embedded into Volusion's servers, highlighting a vulnerability in the system's design [90763]. (b) The software failure incident related to the operation phase can be seen in the Magecart attack on Volusion, where attackers were able to skim credit card information from online stores. This type of attack focuses on e-commerce operations and targets online stores, indicating a failure due to contributing factors introduced by the operation or misuse of the system [90763].
Boundary (Internal/External) within_system (a) within_system: The software failure incident reported in the article is primarily due to contributing factors that originate from within the system. Specifically, hackers were able to breach Volusion's servers and insert malicious code to steal credit card information from online customers [90763]. This indicates that the failure originated from within the system itself, highlighting vulnerabilities in Volusion's infrastructure that allowed for the attack to occur.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: - The software failure incident reported in Article 90763 was a result of a Magecart attack on the cloud infrastructure company, Volusion. Hackers were able to steal credit card information by inserting malicious code into Volusion's servers, which was designed to record and transfer credit card numbers entered into online forms [90763]. (b) The software failure incident occurring due to human actions: - The software failure incident reported in Article 90763 was a result of hackers breaching Volusion's servers and inserting malicious code to steal credit card information. This attack was carried out by human actors who intentionally targeted the online stores hosted by Volusion to scrape and steal credit card information [90763].
Dimension (Hardware/Software) software (a) The software failure incident in the article was not attributed to hardware issues but rather to a hack on the cloud infrastructure company, Volusion, where hackers were able to steal credit card information by inserting malicious code into Volusion's servers [90763]. (b) The software failure incident in the article was caused by contributing factors originating in software, specifically through the insertion of malicious code into Volusion's servers by hackers to steal credit card information from online customers [90763].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case is malicious. Hackers targeted the cloud infrastructure company, Volusion, with the intent to steal credit card information from online shoppers. They inserted malicious code into Volusion's servers to record and transfer credit card numbers entered into online forms [90763]. This type of attack is known as a Magecart attack, where attackers focus on e-commerce sites to scrape and steal credit card information [90763].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident related to poor_decisions: - The software failure incident involving the hack on Volusion's servers, resulting in the theft of online shoppers' credit card information, can be attributed to poor decisions made by the hackers. They inserted malicious code into Volusion's servers to record and transfer credit card numbers entered into online forms [90763]. (b) The intent of the software failure incident related to accidental_decisions: - The software failure incident involving the hack on Volusion's servers does not indicate any accidental decisions that contributed to the failure. The incident was a deliberate attack by hackers aiming to steal credit card information by inserting malicious code into the servers [90763].
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the article as hackers were able to breach Volusion's servers and steal credit card information by inserting malicious code into the company's servers. This indicates a lack of professional competence in ensuring the security of the software and infrastructure [90763]. (b) The software failure incident related to accidental factors is not explicitly mentioned in the provided article.
Duration permanent (a) The software failure incident described in the articles is more aligned with a permanent failure. The Magecart attack on Volusion's servers allowed hackers to insert malicious code designed to record and transfer credit card numbers entered into online forms. This breach was not a one-time event but rather a sustained compromise of the servers, enabling the theft of credit card information over an extended period. The article mentions that skimming code can exist on a breached website for weeks, months, or even indefinitely, victimizing any visitor that makes purchases on that site [90763]. This indicates that the software failure incident was not temporary but rather a persistent issue that allowed unauthorized access and data theft over an extended duration.
Behaviour value, other (a) crash: The software failure incident in the article does not involve a crash where the system loses state and does not perform any of its intended functions [90763]. (b) omission: The software failure incident in the article does not involve omission where the system omits to perform its intended functions at an instance(s) [90763]. (c) timing: The software failure incident in the article does not involve timing issues where the system performs its intended functions correctly but too late or too early [90763]. (d) value: The software failure incident in the article involves a failure due to the system performing its intended functions incorrectly. Hackers were able to steal credit card information by inserting malicious code into Volusion's servers, designed to record and transfer credit card numbers entered into online forms [90763]. (e) byzantine: The software failure incident in the article does not involve a byzantine failure where the system behaves erroneously with inconsistent responses and interactions [90763]. (f) other: The software failure incident in the article involves a breach by hackers who inserted malicious code into Volusion's servers to steal credit card information, which is a form of unauthorized access and data theft [90763].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident described in the article resulted in a significant impact on people's property, specifically their credit card information. Hackers were able to steal the credit card information of online customers by inserting malicious code into Volusion's servers. This code was designed to record and transfer credit card numbers entered into online forms, affecting customers who made purchases on the compromised online stores [90763].
Domain sales, finance, other (a) The failed system was intended to support the sales industry. The incident involved a hack on Volusion, a cloud infrastructure company that provides services to more than 30,000 merchants, including online stores like Sesame Street Live and the official website for Bob Ross [90763]. (h) The incident also relates to the finance industry as hackers targeted online stores to scrape and steal credit card information, affecting the financial transactions of customers [90763]. (m) The incident could also be categorized under the "other" industry as it involves cybercrime and data security breaches, which have implications beyond specific industry sectors [90763].

Sources

Back to List