{"componentChunkName":"component---src-templates-tag-js","path":"/tags/all-security/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":2,"edges":[{"node":{"fields":{"slug":"/identity/secure-email-address-website/"},"html":"<p>The present-day internet is a hotbed of spammers and hackers, and you need to secure your email address. Hackers often scan websites and web pages to extract genuine email addresses and exploit them to attack users with spam messages. </p>\n<p>This should really concern you because many of these spam emails carry potential malware. When you open your mail or click on a link that contains it, the malware gets naturally downloaded to your system.</p>\n<p>For example, let's assume you have entered your email address on a website's contact page, then there's a big chance the email harvesting bots have found it. Thereafter, they start flooding your mail-box with spam emails. </p>\n<p>Luckily, there are a few ways to hide your email address from such spammers and hackers who constantly mine for the same. One way is through <a href=\"https://www.loginradius.com/blog/identity/2020/12/what-to-do-when-email-hacked/\">email harvesting</a>.  </p>\n<p>Let's talk about what it is and then explore the various ways to secure your email address.</p>\n<h2 id=\"what-is-email-harvesting\" style=\"position:relative;\"><a href=\"#what-is-email-harvesting\" aria-label=\"what is email harvesting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Email Harvesting</h2>\n<p>Email harvesting is the process of collecting lists of email addresses via different methods. Generally, it is used for bulk emails or spam. Hackers use \"harvesting bots,\" which crawl multiple sites, chat rooms, web forms, etc., in a few seconds to extract a list of email addresses. </p>\n<p>Other techniques include:</p>\n<ul>\n<li>Posting into UseNet with email addresses.</li>\n<li>Gathering data from white and yellow pages.</li>\n<li>Accessing the same computer used by valid users.</li>\n<li>Accessing emails and address books on another user's computer.</li>\n<li>Spamming through social engineering. </li>\n<li>Buying lists from other spammers.</li>\n<li>Hacking websites.</li>\n<li>Using the method of guessing and cleaning.</li>\n<li>Hacking mailing lists, webpages, web browsers, Internet relay chats, domain contact points, etc. </li>\n</ul>\n<p>These methods allow spammers to gather email addresses and use them to send unsolicited bulk messages to the recipient's inbox. </p>\n<h2 id=\"6-tips-to-secure-your-email-address-on-a-website\" style=\"position:relative;\"><a href=\"#6-tips-to-secure-your-email-address-on-a-website\" aria-label=\"6 tips to secure your email address on a website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6 Tips to Secure Your Email Address on a Website</h2>\n<h3 id=\"1-hide-your-email-address-while-logging-in\" style=\"position:relative;\"><a href=\"#1-hide-your-email-address-while-logging-in\" aria-label=\"1 hide your email address while logging in permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Hide your email address while logging in.</h3>\n<p>One of the major mistakes committed by beginners is that they display their email address. If you are tensed and stressed about online hackers and threats, there is one solution you can always opt for. </p>\n<p>You can always avoid listing your email address on various vague websites. Instead, you can use contact information through which genuine users can contact you.</p>\n<h3 id=\"2-obfuscate-your-email-address\" style=\"position:relative;\"><a href=\"#2-obfuscate-your-email-address\" aria-label=\"2 obfuscate your email address permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Obfuscate your email address.</h3>\n<p>Add an obfuscate plugin puzzle to your email address so hackers cannot identify it. With the help of such plugins, you can replace your email address with codes. These plugins secure your email address from hackers and do not affect the user's usability.  </p>\n<h3 id=\"3-use-a-password-manager\" style=\"position:relative;\"><a href=\"#3-use-a-password-manager\" aria-label=\"3 use a password manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Use a password manager.</h3>\n<p>Use a reliable password manager to change and replace all your passwords with solid, unique ones. We cannot sufficiently stress the importance of using strong passwords to secure your email address.</p>\n<p>Hackers use <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">credential stuffing</a> where they literally jam previously stolen usernames and passwords to break into accounts on various services. </p>\n<p>This is possible because a huge proportion of online users still use the same username and passwords across multiple accounts.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABaElEQVQY002QTUsCYRSFJUjHd8Y0TSpkFMaPzG/wY2Yc09TRIi2oFkUWBO0KrE07c9OqX1KbFrWJIoJo5aZlixb9ldOdMbXFgct77vvce67FHinBEFtaAR8tQyDxVDPj7c8biQsVweI1zCnb8KTqsCd0cNEKuLAGzvBJlhHMHa/AEVbBpAIckSK8aR3uRBWu+Kr5wQSGi+CTDYjVfcT1PTB5B7ZkE2zsa0OgUUhKC/JGB6naLgK5NQTy6+BDCmaWy+QPe4wEotyCL7cOb6YBX5b6lDbcKX081DIq5tN1iNkm/NTsiZUxGy1BCCpwxirjyNagSp/r8KubBG5DJNgC9ZuR/wONyY6IhmkxC0Z3sgbyECgek2QTKNCWlsUMzno3+Pr+wf3TG24fnnH3+IL3wSdePwZw0XmsweIE6KSNbJIKe0gjqAqOYEyabDgVKEDeOsYpQQ/P+zjo9tDpXuHk8hpHF31zqI1Yv+SkwLSl98KVAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        title=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/buyer-guide-to-multi-factor-authentication-ebook.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/buyer-guide-to-multi-factor-authentication-ebook.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"4-use-two-factor-authentication-or-mfa-wherever-possible\" style=\"position:relative;\"><a href=\"#4-use-two-factor-authentication-or-mfa-wherever-possible\" aria-label=\"4 use two factor authentication or mfa wherever possible permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Use two-factor authentication or MFA, wherever possible.</h3>\n<p>When you set up your account passwords, look out for <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-setup-2fa-in-online-accounts/\">two-factor authentication (2FA)</a>/ MFA as well. They are additional security layers that you can apply to prevent resets of unauthorized passwords significantly. </p>\n<p>Whenever a hacker attempts to break into your email, you are notified and control the authority to accept or reject such attempts. </p>\n<h3 id=\"5-replace-your-email-address\" style=\"position:relative;\"><a href=\"#5-replace-your-email-address\" aria-label=\"5 replace your email address permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Replace your email address.</h3>\n<p>If you are not satisfied with any of the above solutions to secure your email address, you can always replace it with \"\". This would take the user directly to your contact page when they click on the email. This not only prevents tons of spam but also protects you from hackers. </p>\n<h3 id=\"6-prevent-email-harvesting\" style=\"position:relative;\"><a href=\"#6-prevent-email-harvesting\" aria-label=\"6 prevent email harvesting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Prevent email harvesting.</h3>\n<p>The following techniques can be used to prevent email harvesting:</p>\n<ul>\n<li>Convert your email address into an image. </li>\n<li>Merge your email address by changing the \"@\" sign to \"at\" and the \".\" sign to \"dot.\"</li>\n<li>Use the email contact form wherever possible.</li>\n<li>Use email obfuscation in JavaScript. The email address will appear scrambled, encoded, or obfuscated in the source code. </li>\n<li>Use HTML for email address obfuscation. </li>\n<li>Prompt users to enter the correct CAPTCHA before revealing the email address. </li>\n<li>Using a spider trap to combat email harvesting spiders.</li>\n<li>Conduct mail server monitoring. This approach can be applied to the email server of the recipient. It dismisses all email addresses from any sender that specifies more than one invalid recipient address as invalid.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/2020/12/bot-attacks/\">Harvesting bots</a> are here to stay; thus, you must take appropriate measures to secure your email address. You can implement the above methods so that you don't become a victim of spammers and hackers in the long run. </p>\n<p>Although it may take a while to get the hang of them, the results are worth spending time on. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 22, 2021","updated_date":null,"title":"How to secure an email address on your website","tags":["all, Security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/b6b491c10267c056d5f47298092a1c5b/14b42/secure-email-address-website.jpg","srcSet":"/static/b6b491c10267c056d5f47298092a1c5b/f836f/secure-email-address-website.jpg 200w,\n/static/b6b491c10267c056d5f47298092a1c5b/2244e/secure-email-address-website.jpg 400w,\n/static/b6b491c10267c056d5f47298092a1c5b/14b42/secure-email-address-website.jpg 800w,\n/static/b6b491c10267c056d5f47298092a1c5b/47498/secure-email-address-website.jpg 1200w,\n/static/b6b491c10267c056d5f47298092a1c5b/ec6c5/secure-email-address-website.jpg 1280w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/what-is-formjacking/"},"html":"<p>There has been a significant surge in formjacking attacks recently. It has been affecting organizations that mostly accept online payment from consumers.</p>\n<p>In recent times, cryptocurrencies have progressed in both popularity and technical improvements. However, the radical decrease in the value of cryptocurrencies like Bitcoin and Monero has led to cybercriminals looking elsewhere for fraudulent profits. </p>\n<p>That being said, what better place to steal your financial information than a product order form on online shopping websites before you even hit the submit button—that's formjacking!</p>\n<p>To understand what other threats formjacking pose, let's get to the basics by exploring this unique kind of <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cyberattack</a>.</p>\n<h2 id=\"what-is-a-formjacking-attack\" style=\"position:relative;\"><a href=\"#what-is-a-formjacking-attack\" aria-label=\"what is a formjacking attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is a Formjacking Attack</h2>\n<p>Formjacking is a type of cyber attack in which hackers insert malicious JavaScript code into the target website, most often to a payment page form. </p>\n<p>Once the malicious code is in operation, when a consumer enters their payment card information and hits submit, the compromised code sends the payment card number and other sensitive information like the consumer's name, address, and phone number to the hacker. </p>\n<p>Hackers send this stolen information to a server for reuse or even sell the personal details on the dark web. While all this happens, the victim is blissfully unaware of their payment details being compromised.</p>\n<p>According to the authenticated <a href=\"https://www.broadcom.com/support/security-center?om_ext_cid=biz_vnty_istr-24_multi_v10195\">Symantec Internet Security Threat Report 2019,</a> formjackers hacked 4,818 unique websites each month in 2018. Symantec blocked more than 3.7 million Formjacking attack attempts in that year alone.</p>\n<h2 id=\"who-is-behind-formjacking-attacks\" style=\"position:relative;\"><a href=\"#who-is-behind-formjacking-attacks\" aria-label=\"who is behind formjacking attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Who Is Behind Formjacking Attacks</h2>\n<p>It is quite complicated for security researchers to pinpoint a single attacker or attack style considering so many unique sites are being attacked simultaneously. However, the majority of formjacking attacks are known to originate from Magecart groups. </p>\n<p>Magecart is a club of hacker groups that have been behind the attacks on various websites. Attacks on Ticketmaster, Feedify, British Airways, and Newegg are only some of the Formjacking examples done by this consortium. </p>\n<p>The group injects web-based card skimmers onto eCommerce sites to <a href=\"https://www.loginradius.com/blog/identity/2020/04/corporate-account-takeover-attacks/\">steal payment card data or credit card information</a> and other sensitive information right from online payment forms.</p>\n<p>Magecart group started hacking into Magneto online stores; however, they have now altered their strategies and are increasingly using formjacking attacks to steal payment card details. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 148%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"who-is-behind-formjacking-attacks\"\n        title=\"who-is-behind-formjacking-attacks\"\n        src=\"/static/536a62a1e643be82873d5537f2fcee6c/e5715/who-is-behind-formjacking-attacks.png\"\n        srcset=\"/static/536a62a1e643be82873d5537f2fcee6c/a6d36/who-is-behind-formjacking-attacks.png 650w,\n/static/536a62a1e643be82873d5537f2fcee6c/e5715/who-is-behind-formjacking-attacks.png 768w,\n/static/536a62a1e643be82873d5537f2fcee6c/2bef9/who-is-behind-formjacking-attacks.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-big-is-this-formjacking-campaign\" style=\"position:relative;\"><a href=\"#how-big-is-this-formjacking-campaign\" aria-label=\"how big is this formjacking campaign permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Big Is This Formjacking Campaign</h2>\n<p>The latest Formjacking campaign conveys that attackers are constantly changing and enhancing their malicious formjacking code and discovering innovative delivery mechanisms to infect users. By the time people even understand formjacking, hackers flee with the information. </p>\n<p>For example, Symantec has been digging into telemetry and examining the technical aspects of formjacking attacks to find that 248,000 formjacking attempts were blocked in 2019. But the worrying thing is that such activities are increasing continually as over one-third of those blocks were encountered between September 13 and 20.</p>\n<h2 id=\"what-categories-of-businesses-are-these-attacks-targeting\" style=\"position:relative;\"><a href=\"#what-categories-of-businesses-are-these-attacks-targeting\" aria-label=\"what categories of businesses are these attacks targeting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Categories of Businesses Are These Attacks Targeting</h2>\n<p>Magecart has been targeting eCommerce giants such as Ticketmaster, Newegg, and British Airways to gain larger profits. </p>\n<p>Symantec's data showcases that the impacted websites are mostly online retail sites, including small niche sites, to more extensive retail business operations. Websites impacted ranged from a fitness retailer to a supplier of outdoor accessories.</p>\n<p>Other online retailers affected included suppliers of parts for vehicles and portals selling gifts or kitchen accessories. </p>\n<p>Therefore, it is safe to assume that any company that processes payments on the internet is a probable victim of formjacking attacks.</p>\n<h2 id=\"how-can-formjacking-attacks-affect-you\" style=\"position:relative;\"><a href=\"#how-can-formjacking-attacks-affect-you\" aria-label=\"how can formjacking attacks affect you permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can Formjacking Attacks Affect You</h2>\n<p>How formjacking attacks can impact your business depends on the type of information the identity thief captures. \"There is some data that can ruin your current day; however, there is some confidential information that can even ruin your complete life,\" says <a href=\"https://www.linkedin.com/in/alex-hamerstone-364b4520\">Alex Hamerstone</a>, Practice Lead: Governance, Risk and Compliance at TrustedSec.</p>\n<p>You must monitor your bank and credit card statements and keep an eye on your credit scores. Unfortunately, it is almost impossible for victims to identify formjacking attacks, considering most still do not understand what is formjacking, let alone knowing how to detect it. </p>\n<p>So, it is solely upon the IT professionals to keep a constant check on their systems to detect and eliminate it, if such a specific threat were to occur.</p>\n<h2 id=\"how-can-businesses-protect-your-credit-card-and-other-information-from-formjacking\" style=\"position:relative;\"><a href=\"#how-can-businesses-protect-your-credit-card-and-other-information-from-formjacking\" aria-label=\"how can businesses protect your credit card and other information from formjacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can Businesses Protect Your Credit Card and Other Information From Formjacking</h2>\n<p>You may not be able to stop Formjacking before it attacks your system, but you can take steps to protect your personal details. </p>\n<p>Use credit cards instead of debit cards while shopping online to reduce <a href=\"https://www.loginradius.com/blog/identity/2020/11/ecommerce-security/\">financial risks</a>. The reason behind this is simple. </p>\n<p>If someone uses your credit card information deceptively or indulges in card fraud, they will be exhausting the funds of the credit card companies. In the case of debit cards, the funds are directly tied to your checking account balance.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"protecting-pii-against-data-breaches\"\n        title=\"protecting-pii-against-data-breaches\"\n        src=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-pii-against-data-breaches.png\"\n        srcset=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/a6d36/protecting-pii-against-data-breaches.png 650w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-pii-against-data-breaches.png 768w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/63ff0/protecting-pii-against-data-breaches.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-to-prevent-formjacking-attacks\" style=\"position:relative;\"><a href=\"#how-to-prevent-formjacking-attacks\" aria-label=\"how to prevent formjacking attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Formjacking Attacks</h2>\n<ul>\n<li>Make sure that your IT professionals are well-versed with what is formjacking. </li>\n<li>Use the latest antivirus software; one with a reputable status can <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">safeguard your system</a> from some if not all formjacking attacks. </li>\n<li>Run scans and tests to check for vulnerabilities in your systems and fix them before a cybercriminal can find them. </li>\n<li>Every time your software gets a new update, run a test to look for discrepancies before launching it on the web. </li>\n<li>Don't forget to monitor your systems' behavioral patterns so that you can detect suspicious patterns and block the apps that may cause damage to your system.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Victims don't realize that they have fallen prey to formjacking attacks easily as websites prolong to operate as usual, and Magecart formjacking attackers take steps to stop their detection. </p>\n<p>Even with all preventive measures in place, it can still be exceedingly difficult to spot formjacking attacks. However, as an online business, you must have all the protocols in place to quickly alert consumers in the case of such attacks.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 15, 2021","updated_date":null,"title":"What is Formjacking","tags":["all, Security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/fdccc143a05e8d7762360472dedb082a/9a31d/what-is-formjacking.jpg","srcSet":"/static/fdccc143a05e8d7762360472dedb082a/f836f/what-is-formjacking.jpg 200w,\n/static/fdccc143a05e8d7762360472dedb082a/2244e/what-is-formjacking.jpg 400w,\n/static/fdccc143a05e8d7762360472dedb082a/9a31d/what-is-formjacking.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]}},"pageContext":{"tag":"all, Security"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}