Cyberattacks Focusing on E-commerce Applications

Cyber assaults on e-commerce applications are a frequent craze in 2023 as e-commerce businesses grow to be far more omnichannel, they develop and deploy more and more much more API interfaces, with risk actors regularly discovering additional ways to exploit vulnerabilities. This is why typical testing and ongoing checking are needed to completely secure web purposes, determining weaknesses so they can be mitigated speedily.

In this post, we will discuss the the latest Honda e-commerce system assault, how it transpired, and its effects on the enterprise and its customers. In addition, to the value of software stability tests, we will also examine the different locations of vulnerability tests and its several phases.

Lastly, we will give information on how a long-time period preventative alternative this sort of as PTaaS can shield e-commerce organizations and the dissimilarities between steady tests (PTaaS) and typical pen tests.

The 2023 Honda E-commerce Platform Attack

Honda’s electricity devices, lawn, garden, and marine goods commerce platform contained an API flaw that enabled any one to ask for a password reset for any account.

The vulnerability was observed by researcher Eaton Zveare who not too long ago identified a main protection flaw in just Toyota’s supplier portal. By resetting the password of better-stage accounts, a risk actor was delivered with admin-degree information entry on the firm’s network with no restriction. If found by a cybercriminal, this would have resulted in a massive-scale facts breach with enormous ramifications.

Zverare said: “Broken/missing accessibility controls built it probable to entry all details on the system, even when logged in as a check account.”

This authorized the tester to access the following info:

  • Just about 24,000 buyer orders throughout all Honda dealerships from August of 2016 to March of 2023 this bundled the customer’s name, address, and telephone range.
  • 1,091 active seller sites with the capacity to modify these internet sites.
  • 3,588 vendor buyers/accounts – which include private specifics.
  • 11,034 purchaser emails – including to start with and last names.
  • 1,090 vendor e-mail.
  • Inside economic reviews for Honda.

With the previously mentioned information and facts, cybercriminals could accomplish a vary of things to do, from phishing strategies to social engineering assaults and promoting details illegally on the dark world wide web. With this amount of obtain, malware could also be installed on supplier web sites to endeavor to skim credit rating playing cards.

How Was The Vulnerability Found

On the Honda e-commerce system, “” subdomains are assigned to registered sellers. Zveare found out that the password reset API on a single of Honda’s sites, Energy Gear Tech Specific (PETE), was processing reset requests with no demanding the preceding password.

A valid electronic mail tackle was observed through a YouTube video clip that delivered a demo of the vendor dashboard employing a check account. When reset, these login credentials could be employed on any Honda e-commerce subdomain login portal, offering entry to inner dealership information.

Future, the tester necessary to obtain the accounts of genuine dealers with no the chance of detection and without having needing to reset the passwords of hundreds of accounts. To do this, Zveare found a JavaScript flaw on the platform, the sequential assignment of consumer IDs, and a lack of accessibility protection. As these kinds of, stay accounts could be discovered by incrementing the person ID by 1 until eventually there weren’t any other outcomes.

Lastly, the platform’s admin panel could be entirely accessed by modifying an HTTP response to make it appear as if the exploited account was an admin.

On April 3, 2023, Honda documented that all the bugs experienced been mounted following the findings have been originally documented to them on March 16, 2023. Eaton Zveare been given no money reward for his work as the firm does not have a bug bounty plan.

The Great importance of E-commerce Application Safety Testing

E-commerce software security tests is vital to guard the own and money information and facts of everyone joined to the application, like buyers, dealers, and suppliers. The frequency of cyberattacks on e-commerce programs is substantial, this means sufficient safety is required to avoid data breaches that can severely problems the standing of a organization and trigger economic reduction.

Regulatory compliance in the e-commerce sector is also stringent, with knowledge protection becoming business enterprise-important to keep away from money penalties. An application needs more than just the latest protection capabilities, each individual ingredient desires to be analyzed and very best tactics followed to produce a robust cybersecurity technique.

Cyber Threats For E-commerce Apps

  1. Phishing – Phishing is a kind of social engineering assault that aims to trick victims into clicking a hyperlink to a destructive internet site or software. This is finished by sending an electronic mail or textual content that is created to appear as if it has been sent from a dependable supply, these types of as a financial institution or work colleague. As soon as on the destructive internet site, buyers might enter details these types of as passwords or account numbers that will be recorded.
  2. Malware/ Ransomware – As soon as contaminated with malware, a vary of routines can acquire position on a procedure, these types of as locking people out of their accounts. Cybercriminals then talk to for payment to re-grant access to accounts and units – this is acknowledged as ransomware. On the other hand, there is a variety of malware that conduct different steps.
  3. E-Skimming – E-skimming steals credit card facts and own information from payment card processing internet pages on e-commerce web sites. This is achieved by way of phishing attacks, brute drive attacks, XSS, or probably from a third-occasion web site becoming compromised.
  1. Cross-Web page Scripting (XSS) – XSS injects destructive code into a webpage to concentrate on website consumers. This code, generally Javascript, can history user enter or keep track of web page exercise to gather sensitive information and facts.
  1. SQL Injection – If an e-commerce software retailers knowledge in an SQL database, then an SQL injection assault can input a destructive question that lets unauthorized obtain to the database’s contents if it is not adequately safeguarded. As perfectly as being able to check out knowledge, it may possibly also be feasible to manipulate it in some circumstances.

The Various Areas of Vulnerability Screening

There are typically 8 significant places of vulnerability screening, and their methodology can then be broken down into 6 phases.

8 Locations of Vulnerability Testing

  • Website Application-Dependent Vulnerability Assessment
  • API-Based Vulnerability Assessment
  • Network-Centered Vulnerability Evaluation
  • Host-Dependent Vulnerability Evaluation
  • Actual physical Vulnerability Evaluation
  • Wi-fi Network Vulnerability Evaluation
  • Cloud-Based mostly Vulnerability Assessment
  • Social Engineering Vulnerability Assessment

The 6 Phases of Vulnerability Assessment Methodology

  1. Decide crucial and large-chance belongings
  2. Conduct a vulnerability assessment
  3. Perform vulnerability examination and danger assessment
  4. Remediate any vulnerability – E.G., applying security patches or fixing configuration concerns.
  5. Assess how the technique can be improved for optimal protection.
  6. Report the benefits of the evaluation and the actions taken.

Pentesting As A Assistance (PTaaS)

Penetration Testing as a Assistance (PTaaS) is a delivery system for normal and price tag-successful penetration tests whilst also boosting collaboration involving screening companies and their purchasers. This makes it possible for corporations and companies to detect vulnerabilities extra routinely.

PTaaS vs. Standard Pen Screening

Regular penetration tests is completed on a contractual basis and typically can take a significant total of time. This is why this kind of testing can only be carried out after or two times a yr. PTaaS, on the other hand, permits steady tests, even as typically as each and every time code is transformed. PTaaS performs ongoing, genuine-time assessments using a combination of automatic scanning resources and manual methods. This gives a far more steady approach to protection requirements and fills in the gaps that come about with once-a-year screening.

Click below to learn much more about the gains of PTaaS by requesting a stay demo of the SWAT system produced by Outpost24.


Cyberattacks on e-commerce web-sites occur frequently, and even platforms developed by world firms this sort of as Honda have contained essential vulnerabilities that have been learned in the past 12 months.

Security tests is essential to assess the comprehensive attack area of an e-commerce software, protecting each the business and its consumers from cyber assaults like phishing or e-skimming.

Penetration testing as a services is a person of the greatest techniques to protect platforms, performing standard scans to offer ongoing vulnerability assessments so they can be mitigated as soon as probable.

Observed this posting fascinating? Stick to us on Twitter and LinkedIn to read through additional unique material we put up.