<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic magecart mitigation in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/magecart-mitigation/m-p/14749#M456</link>
    <description>&lt;P&gt;I have created an electron app to simulate magecart entirely client side (so not a true reflection).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's at&amp;nbsp;&lt;A href="https://github.com/kempy007/magecart-shim" target="_blank"&gt;https://github.com/kempy007/magecart-shim&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know of any techniques that could mitigate this risk?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Owasp have a good article here &lt;A href="https://www.owasp.org/index.php/3rd_Party_Javascript_Management_Cheat_Sheet" target="_blank"&gt;https://www.owasp.org/index.php/3rd_Party_Javascript_Management_Cheat_Sheet&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However I don't feel it would be possible to prevent a script coming from client side from scraping the data, what the owasp article mentions would all be server side control.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Sep 2018 07:55:45 GMT</pubDate>
    <dc:creator>Kempy</dc:creator>
    <dc:date>2018-09-19T07:55:45Z</dc:date>
    <item>
      <title>magecart mitigation</title>
      <link>https://community.isc2.org/t5/Tech-Talk/magecart-mitigation/m-p/14749#M456</link>
      <description>&lt;P&gt;I have created an electron app to simulate magecart entirely client side (so not a true reflection).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's at&amp;nbsp;&lt;A href="https://github.com/kempy007/magecart-shim" target="_blank"&gt;https://github.com/kempy007/magecart-shim&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know of any techniques that could mitigate this risk?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Owasp have a good article here &lt;A href="https://www.owasp.org/index.php/3rd_Party_Javascript_Management_Cheat_Sheet" target="_blank"&gt;https://www.owasp.org/index.php/3rd_Party_Javascript_Management_Cheat_Sheet&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However I don't feel it would be possible to prevent a script coming from client side from scraping the data, what the owasp article mentions would all be server side control.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 07:55:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/magecart-mitigation/m-p/14749#M456</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2018-09-19T07:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: magecart mitigation</title>
      <link>https://community.isc2.org/t5/Tech-Talk/magecart-mitigation/m-p/14751#M458</link>
      <description>&lt;P&gt;The best answer to mitigate this threat is to implement content security policy headers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.pluralsight.com/courses/defending-javascript-keylogger-attacks-pci" target="_blank"&gt;https://www.pluralsight.com/courses/defending-javascript-keylogger-attacks-pci&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 13:11:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/magecart-mitigation/m-p/14751#M458</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2018-09-19T13:11:51Z</dc:date>
    </item>
  </channel>
</rss>

