Retail giant Target is going to open-source an internal tool, dubbed Merry Maker, designed to detect e-skimming attacks.
Retail giant Target announced the release in open-source of an internal tool, dubbed Merry Maker, designed to detect e-skimming attacks.
Merry Maker is a tool designed by Target security developers Eric Brandel and Caleb Walch (@ebrandel and @cawalch) to detect the presence of e-skimmer on e-store. The name comes from the tool’s ability to help keep the holiday shopping season – and all shopping occasions – safer and merrier.
The tool scans the payment page code for malicious pieces of software and analyzes saved network traffic for any potential compromise.
Merry Maker also works by preserving a baseline of existing pages by saving the code being served by a website along with the network traffic generated by test transactions
Target is actively using Merry Maker since 2018, the tool has completed over one million website scans.
Target has open sourced the Merry Maker framework along with several detection rules that could be used by cybersecurity teams to set up and customize their defense.
“Today we’ve open sourced the Merry Maker framework along with several detection rules in the hopes that this information helps other cybersecurity teams stand up their own customized defense. Digital security is a team sport – a threat to one is a threat to all – and entities need to work together to create safe online environments for consumers.” concludes Target. “We’re proud to be a leading sharer and collaborator across the retail industry and we hope Merry Maker helps others protect against digital skimming attacks.”
Target pointed out that security experts can create their own detections rules via Typescript.
(SecurityAffairs – hacking, Merry Maker)
The post Retail giant Target open sources Merry Maker e-skimmer detection tool appeared first on Security Affairs.