The presentation discusses the importance of detecting digital scheming attacks and presents a method to do so using one-way hash functions. It also highlights the challenges in implementing detection methods and suggests ways to make it harder for attackers to exploit vulnerabilities.
- Digital scheming attacks often happen through JavaScript and can exploit vulnerabilities in third-party components or infrastructure.
- Patching and keeping third-party components up to date is important for security hygiene.
- Content security policies and script integrity checks can make it harder for attackers to exploit vulnerabilities.
- One-way hash functions can be used to detect changes in source code and alert security teams.
- Implementing detection methods can be challenging for development teams, especially in smaller companies with limited resources.
- Automated tools like Suricata JS can help detect digital scheming attacks and alert security teams.
The presentation cites the example of the Ticketmaster data breach, where attackers injected their schema code into Ticketmaster's scripts through a third-party provider. The schema code was reflected in Ticketmaster's web pages, and credit card information was stolen as a result.