Threat Briefing: Safeguard Websites From Third-Party JavaScript Attacks

How to protect the enterprise from the growing Magecart threat vector

Add bookmark

Cyber security experts believe that Magecart threat actors have been around since 2015, however the group really surfaced through an initial discovery in June 2018 when Ticketmaster was attacked. Since then, the group has stepped up its game with more sophisticated and pervasive attacks, while doing a good job at covering up its tracks.

According to award-winning security blogger, researcher, podcaster and public speaker Graham Cluley, there have been reports that close to 50,000 online stores have been compromised by this threat so far. In fact, in the last six months, British Airways, Feedify, Umbro, Vision Direct, Newegg, BevMO and most recently, Titan Manufacturing and Distributing have all revealed that they have been compromised by Magecart.

See Related: "Mitigating Magecart Attacks – Why Real-Time Prevention Is Your Best Option"

“The fundamental problem is this – just about every website uses third-party Javascript used by other people. It’s an easy way to add functionality to a site with no coding required. A very common example is Google Analytics, used by many millions of websites to provide webmasters with a way of collecting web traffic statistics,” explains Cluley.

And while your company may have security in place to prevent hackers from successfully breaking into your systems, with a Magecart-style attack, they haven’t directly compromised your IT infrastructure. Instead, they have poisoned a third-party script used by your website. “It’s equivalent to poisoning a water supply upstream from where it’s being drunk,” he says.

Take Preventative Measures

The best action for the enterprise is to prevent an attack from happening in the first place. By implementing technology that controls the access and permissions of every third-party JavaScript vendor running on web pages, helps to insulate websites, visitors and private customer data.

Prevention approaches not only help to secure the organization, but are required for data control as defined by regulatory compliance (like GDPR). That is why on February 27th, Cyber Security Hub will host a web seminar which will tap into the expertise of Cluley and present various preventative approaches including:

  • Content Security Policy
  • Monitoring & Detection
  • Vendor Due Diligence Assessments
  • Restricting the Usage of Third-Party Tools

Every website is susceptible to this attack vector as traditional security programs cannot prevent client-side third-party JavaScript attacks. Register and attend the full web seminar to raise your awareness of this universal flaw and start safeguarding your organization from this vulnerability today.


Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended