Brazilian e-commerce is expected to generate more than 234,9 million reais in 2025, according to ABComm, what does a 15% increase compared to last year represent. The growth of sales in the digital environment also attracts the attention of cybercriminals, that improve their practices against retailers and consumers, in order to steal and kidnap data, take down online stores or fraud promotions in emails, fake messages and websites
In addition to the negative impact on the consumer, a virtual store that is attacked or cloned can bring financial losses and damage to the brand's reputation. In the face of the possibility of scams, the specialist Eduardo Gonçales, CISO of TIVIT, Brazilian multinational that connects technology for a better world, list some precautions for retailers to sell without headaches
Ensure availability– The stability of the site is essential for the operation to function fully even during periods of increased traffic, thus preventing the store from stopping sales due to technical issues. In addition to investment in technological infrastructure and security solutions, it is essential to protect against so-called denial of service (DDoS) attacks, that aim to direct a volume of simultaneous accesses far above normal to a certain address until it becomes congested and unavailable
Explore a web Include routines in your processesthreat intelligence, or brand monitoring, in order to research mentions of the company and its executives in forums across different layers of the internet, including thedark webanddeep web, where all types of attacks are ordered and designed. With this type of scanning, it is possible to detect plans to redirect traffic from your site to fake pages on the internet or social media, thus preventing improper or fraudulent sale of products with your brand
Raise awareness among employees to protect their data – Market research indicates that the main entry points formalwareused in attacksphishingand ofransomware, that encrypt the data in exchange for a ransom payment, they are the employees themselves. Most of the time, due to lack of knowledge, there is carelessness when dealing with suspicious emails, USB device connection, access to compromised sites or use of software with vulnerabilities. With remote work, the use of personal devices connected to the corporate network also increased. Besides technology and processes, raising people's awareness is one of the essential pillars to ensure data security and avoid operational shutdown
Perform backup and validate its integrity – With the aim of minimizing the risks of service interruption and ensuring that data is recovered quickly and easily, it is very important to have a consistent backup system, periodically tested for validation of its content and integrity, since many attacks start by compromising the backup and then impact the production environment. Furthermore, it is essential to have documentation with the catalog of all servers and ensure the order of data recovery in the event of a disaster, reducing data recovery time
Validate your code repositories – A massive infection campaign in e-commerce stores is underway with the name ofHubberstore, the attack occurs from a malicious JavaScript code, used for extracting personal data and credit card information.
The recommendations in this case are as follows:
- Keep the systems updated, including operating systems, services andframeworksused on the sites
- Periodically review the codes in your repository and production environment, seeking to identify possible injections of malicious artifacts
- Follow the best practices for secure development, a good reference is OWASP
- Analysislogsand audit trails, preferably using a correlation system oflogs(SIEM), with the aim of identifying attempts to exploit vulnerabilities
- Implement a multi-factor authentication (MFA) solution at the main entry points and in your key code development environments, como repositórios e soluções de CI/CD (integração e entrega contínua)
Control and limit access to information – Ensure that users have the minimum privilege and restrict access for those who really need it, ensuring your periodic review and recertification. The implementation of segmentation in the network minimizes the risk of an attack spreading quickly and uncontrollably, avoiding significant impact and financial loss, and, finally, use a password vault solution to enhance security for privileged access