Free App Helps Online Shoppers Avoid Fake or Compromised Shopping Sites

Zscaler has released Safe Shopping, a free Firefox plugin that consumers can download to protect them from fake and compromised online stores.

The number of compromised and fake online stores is growing, and unsuspecting users are falling victim to such sites every day. When end users attempt to purchase goods from such sites, they are giving away sensitive information such as credit card numbers. The plugin warns users when they visit one of the suspect domains. Zscaler Safe Shopping is continually updated, via the Zscaler cloud security service, whenever new compromised or fake online stores are identified.

Virtually all browsers contain blacklists to prevent users from accessing known malicious sites: Google Safe Browsing and Phishtank are two examples. However, these blacklists do not generally block sites that have been compromised.  Rather, they block the malicious pages that hijacked sites ultimately redirect to.  This behavior is fine for most websites where you just surf and do not leave any sensitive information. However, in the case of shopping and commerce sites, where a user leaves a mailing address, phone number and credit card details, this type of blocking is not sufficient.  These types of commerce attacks are successful because users often have no idea that the site they are visiting has been compromised, or is a scam built by ill-intentioned hackers.

"Attackers are constantly adjusting their tactics and traditional security controls are failing to keep up," said Julien Sobrier, senior researcher at Zscaler labs and developer of the plugin.  "As blacklists have improved their detection of traditional attacks such as fake antivirus campaigns, attackers are now shifting to fake and compromised storefronts, which are not being detected by the browser."

According to Michael Sutton, VP of security research, "Users have grown comfortable with online commerce. What they don't realize is that lesser-known online stores can become compromised, often due to known vulnerabilities in popular technologies that have not been patched by the merchant. When this occurs, while the store itself may be legitimate, attackers could have access to the back end database."

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.