Website Payment Card Breach
Home / About Maryman / Case Studies / Incident Response – Website Payment Card Breach
CASE STUDY
Website Payment Card Breach Incident Response Case Study
Tags
Website Breach, Credit Card Breach, Payment Card Breach, WordPress
Background
Scope
Preservation
Analysis and Findings
The Maryman team was able to confirm that the rogue script was not added by the web development team. Like many websites on the internet, this website was built on WordPress. Unfortunately, there were three major security patches for WordPress that had not been deployed to the site to fix the vulnerabilities in WordPress. The forensic analysis indicated that one of the vulnerabilities had been exploited to launch the attack and deploy the rogue script into the website code.
The rogue script forwarded the credit card numbers to another website that was suspected to have been compromised by the same hackers. We worked in collaboration with the other company, and it was discovered that the credit card numbers were being forwarded to the Middle East.