Post Now
Image

On Wednesday, LCBO  revealed that third-party forensic investigators found a credit card stealing script was active on its website for five days.

A Canadian government enterprise and the country's largest beverage alcohol retailer, the Liquor a ok Control Board of Ontario(LCBO), revealed that an unauthorised party had attacked its website to inject malicious code designed to obtain customer and credit card information during checkout.

The Government controlled firm operates 688 retail shops and employs more than 8000 folks and five regional warehouse amenities. It is a wholesale to 450 grocery shops and wholesale supplies for 18000 bars and eating places.

On Wednesday, LCBO  revealed that third-party forensic investigators found a credit card stealing script was active on its website for five days.

"At this time, the organisation confirmed that attackers injected malicious code into the website to steal personal information," stated LCBO.

According to a statement released by LCBO, between January 5, 2023, and January 10 2023, customers who provided personal information on checkout pages and proceeded to payment pages on LCBO.com had their data compromised.

It consists of sensitive information such as credit card numbers, addresses and other identifying information. The results of a breach can be severe for customers because they may be at risk of identity theft or financial fraud.

The customers who used the mobile app or the vintageshoponline.com online store to purchase were not affected added LCBO. Still, the company is investigating and identifying all customers affected by this breach.

They discovered the attack on January 10. LCBO's website and mobile app were unavailable for longer; they have yet to explain why it was taken down.

One day later, the Canadian retailer revealed that the LCBO.com website and app were offline because of a 'cyber incident' being investigated.

Web Skimmer injected into LCBO's online store. Web skimmer, also knowns as Magecart attacks, the threat actors exploited an unpatched vulnerability in the site backends and injected malware designed to intercept transaction data during checkout. Magnecart attack, designed to collect card data and send it to an attacker-controlled server. Then the stolen information is later sold to other cybercriminals on hacking or carding forums.

The customers who used LCBO.com during this time should monitor their credit card statements and report suspicious transactions. They should also be aware of incoming phishing emails and scams exploiting their details. The company also stated it would offer free credit monitoring services to affected customers. This incident highlights the importance of online transactions.

Steps to Prevent Future Attacks From Skimmers.

Scan websites regularly for vulnerabilities and patch them. It is essential for e-commerce websites, which are the main target for skimming attacks.

Update software regularly. Organisations should also invest in solid cybersecurity measures like IDS, firewalls, and antivirus software.

Use web application security scanners, which will automatically identify and report vulnerabilities in website code.

Scan and update any third-party scripts or services used on the website.

Implement Multifactor authentication.

Educate employees on identifying and avoiding phishing emails and using unique and strong passwords for all accounts.

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.

You may be interested in reading: How to Survive the COVID Time Cyber ​​Security Threats?