The Invisible Thief Sitting on Your Favorite Retailer’s Checkout Page — and How to Protect Yourself

The Invisible Thief Sitting on Your Favorite Retailer’s Checkout Page — and How to Protect Yourself

The most sophisticated payment card theft happening right now does not involve a stolen wallet or a cloned card reader — it happens in the 400 milliseconds between when you type your card number and when the merchant’s server receives it. It is called a Magecart attack, and it has hit Warner Music Group, British Airways, and hundreds of smaller retailers that never made the news. A malicious script, injected into a third-party component of a retailer’s website, silently copies your card data and sends it to attackers in real time. You see a normal checkout experience. The theft is already done.

As a consumer, there are meaningful protections you can take. Using virtual card numbers offered by your bank creates a one-time use credential that is worthless if stolen. Apple Pay, Google Pay, and contactless payment methods through your phone tokenize your actual card number so that the merchant never sees it. Checking your card statements weekly — not monthly — allows you to catch unauthorized charges before they age into disputed territory.

For the businesses on the other side of this equation, PCI DSS v4.0’s new requirement for continuous monitoring of payment page scripts was written precisely to counter Magecart. It is not optional. It is not just for large merchants. It is the baseline that every organization accepting online payments must now meet — and most do not yet.

Post Your Comment

Rosen Burke Consulting L.L.C
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.