Page 20 - gs250702
P. 20

Insights and Expertise




                 Demystifying ecommerce skimming:

                         What merchants need to know






                                                                Why the new PCI DSS requirements matter

                                                                PCI DSS v4.0.1 addresses e-skimming head-on with two
                                                                new mandates:
                                                                   • 6.4.3:  Merchants  must  maintain an inventory  of
                                                                     scripts on their payment pages and document why
                                                                     each is necessary.
                                                                   • 11.6.1: A tamper-detection mechanism must monitor
                                                                     scripts weekly and alert the merchant to unauthorized
                                                                     changes.
                                                                These requirements are sound, but implementation often
                                                                reveals confusion, especially when TPSPs are involved.
                                                                TPSPs: Who’s doing what?

                                                                Many merchants use ecommerce platforms or web hosting
        By Chris Bucolo                                         partners to manage key elements of their checkout page. But
                                                                this creates a common vulnerability: miscommunication.
        Aperia Compliance, an IXOPAY company
                                                                This kind of thing happens all the time. For example, a
                 arlier this year, attackers quietly exploited a   merchant is using an ecommerce shopping cart supported
                 payment processor’s  API, injecting malicious   by a third party. The merchant thinks the TPSP is
                 scripts into legitimate merchant checkout pages,   responsible for patching it; the TPSP assumes it’s on the
        E capturing customer credit card data before it         merchant. No one patches it, and that’s all it takes for a
        was successfully processed. This is just the latest evolution   breach to happen. We see the e-skimming threat in a
        in e-skimming, a threat many merchants still don’t fully   similar light.
        understand, even as new PCI DSS v4.0.1 requirements
        attempt to address it.                                  What merchants should be asking

        For merchants, breaches like this can lead to significant   To assess areas of responsibility and potential vulnerability,
        financial losses, reputational damage and potential legal   merchants should ask the following questions:
        liabilities. For customers, it’s personal: unauthorized    • Does  my  ecommerce  set-up  put  those  two  new  re-
        transactions and identity theft.                             quirements in scope for me?
        Scripts, hidden windows of vulnerability

        Payment pages today rely on a complex web of scripts                   What is PCI DSS v4.0.1?
        for analytics, marketing, form validation and payment
        processing. These scripts interact with the consumer’s    PCment pages. Requirement 6.4.3 mandates that mer-
        browser, often pulling in content from multiple third-    chants maintain an up-to-date inventory of all scrI
        or even fourth-party sources. Every added script is a     DSS v4.0.1 introduces two key requirements to com-
        potential open window for attackers.                      bat e-skimming threats on merchant payipts on their
                                                                  checkout pages and document the business need for
        The  guidance  on  PCI  DSS  v4.0.1  requirements  6.4.3  and   each. Requirement 11.6.1 requires implementation of
        11.6.1, has changed more than once in just a few months.   a tamper-detection mechanism that monitors scripts
        This has left many acquirers, merchants and their third-  at least weekly and alerts the merchant to unauthor-
        party service providers (TPSPs) wondering: do these new   ized changes. These updates aim to close security
        requirements  apply  to  me?  If  so,  who’s  responsible  for   gaps caused by third- and fourth-party scripts, which
        covering them, me or my TPSP?                             are often exploited by attackers. However, many
                                                                  merchants remain unclear about responsibility—es-
        The confusion is real, and the risk is growing.           pecially when third-party service providers manage
                                                                  parts of the checkout experience.rprises.


        20
   15   16   17   18   19   20   21   22   23   24   25