Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Understanding how hackers find their way in application supply chain

By Uri Dorot
hacker-in-hoodie.jpg

Image via Pixabay

August 22, 2023

The so-called application supply chain — the network of interconnected and interoperable third-party components that modern applications increasingly rely on — represents one of the latest and most serious vulnerabilities that hackers are targeting. Security teams must rethink their approaches and strategies to respond to this threat.

Until only a few years ago, application developers employed a three-tier architecture or monolithic structure, hosting their apps in secure local data centers. In this straightforward model, applications were simple to build and deploy, and the application perimeter was easy to define and protect. Enterprises largely did (and continue to do) a good job protecting their data centers, safeguarding their single-entry point with an application delivery controller and a web application firewall (WAF).

Today, due to newer application architectures, security has gotten a lot more complicated. Now, enterprises create, maintain and host multiple applications in multiple environments (e.g., on-premises and in the cloud), and rely on many connections to third-party services to feed content and data into the applications. The average application depends on dozens of third-party JavaScript services to support processes related to areas such as inventory management, advertising, payment services, and numerous other widgets and content sources. Some examples of popular JavaScript services include brands like Google Analytics, Outbrain, WordPress, Magento and Tranzila. Many of these application components even use a series of fourth- and fifth-party subcomponents and services.

With a substantial portion of the content now composed by the user’s browser (instead of a web server safely protected behind the WAF), this application supply chain represents a significant and tempting vulnerability to hackers and other nefarious actors.

As threats escalate, we see many organizations employing multiple WAFs for their different environments, as well as solutions to prevent and respond to DDoS events, malicious bots, API hacks and other attacks on the application’s main digital assets and data centers. Unfortunately, in the new model of the application supply chain, these go-to methods, tools, and practices are no longer enough to protect an application’s data.

Formjacking: A new opportunity for hackers

As server-side security matures, more hackers are on the hunt for new entry points, including the often-overlooked third-party services and connections in an applications infrastructure. From here, they’re launching attacks through the less protected and monitored client-side supply chain. One of the fastest-growing threats for exploiting vulnerabilities in the application supply chain is formjacking. In this attack, sophisticated attackers hide malware in third-party services used by the application.

When a user receives an HTML response from the app to initiate a form request to the infected third-party service, in response, malicious code is injected directly onto the target’s form. It collects the sensitive information the user enters and returns it to the attacker’s remote server — outbound traffic that’s not monitored by the WAF. Unfortunately, in addition to going to the intended payment service (for example), the user’s personally identifiable information (PII) is unknowingly redirected to the hacker’s server.

Real world consequences

Executed successfully, attacks on the application supply chain can have devastating results.

In 2018, hackers used formjacking to collect payment-card data from 380,000 British Airways customers by adding scripts on the baggage claim information page of the airline’s website – which then collected data from visitors and sent it back to the hackers’ server.

In addition, thieves attacked Segway in 2022 to skim credit card information from hundreds of thousands of customers by inserting scripts into Segway’s vulnerable online stores. Cybersecurity experts believe the hackers targeted a vulnerability in the content management system the store uses. In California in 2022, a single formjacking attack on a third-party plug-in led hundreds of restaurant websites to lose tens of thousands of customer records. In January 2023, there was a huge formjacking attack on one of Canada’s biggest beverage retailers.

Traditional WAFs: A weak link

Despite an organization’s best efforts to protect their application environments and customers’ personal data, the information their users enter on the browser side (e.g., ID numbers, addresses, or credit card numbers) can be exposed to third-party services embedded in their applications. These are automatically trusted by the main application but are rarely monitored. And that becomes the organization’s problem. The organization is liable for data breaches on the browser side of their application just as much as on the server side in their data center.

Traditional WAFs monitor only incoming traffic to applications — the data path between end users and the application. Since the WAF is deployed as an on-prem appliance or as a reverse proxy cloud WAF, it’s blind to any communication between the user’s browser and the application’s third-party services. Nonetheless, regulators will hold the organizations responsible for the safety of its users’ data and PII. But that presents a major problem—a few important things are simply out of an organization’s control:

  • There’s no way to know if the JavaScript code in the services its applications rely on has been breached or tampered with.
  • It has no control over the security of third-party services.
  • It cannot monitor the subcomponents — the fourth- or fifth-party services — its applications rely on.

Protection from the client side

Client-side protection is the key to protecting user data and accounts while conforming to compliance frameworks.  But what should an organization look for in a solution?

  • Visibility — An organization can’t address what it can’t see. But in many organizations, the people who are securing the application aren’t necessarily aware of all the potentially dozens of third-party services and platforms in use. That’s why it’s essential to find a client-side protection tool that can automatically detect, map, and expose all third-party services in the application supply chain.
  • Change Detection — Client-side protection is only valuable if it’s up to date. Make sure the protection solution continuously detects changes and sends alerts any time a component in the supply chain gets updated. In particular, be on the alert for unusual communications or illegitimate script parameters between users’ browsers and the application’s third-party services.
  • WAF Integration — A client-side protection tool should be a seamless part of the WAF, so it can mitigate and block anomalous and nefarious requests and prevent data leakage.
  • Granular Mitigation — Since most of the third-party JavaScript services in the supply chain are vital to an application’s functionality, a client-side protection solution must be able to surgically block only the nefarious scripts without taking down entire services.

Trust but verify

In general, enterprises do a fine job of protecting their data centers. That’s why hackers are looking for new and easier ways to attack applications or steal information. Modern applications are increasingly reliant on third-party services and plug-ins. And the content for today’s applications primarily happens in the browser. That means many more opportunities for malicious actors who can plant malware in one third-party service — and attack many sites all at once.

While most third-party vendors work constantly to patch and update their services, the ultimate responsibility for the security of an application will still fall to upon the organization. That’s why it’s essential for organizations to be vigilant in their efforts to verify the legitimacy and security of the third-party components connected to their applications.

KEYWORDS: API keys API security application security cyber attack data center data center security DDoS personal identifiable information third-party security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Uris headshot

Uri Dorot, Sr. Security Solutions Lead at Radware.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Podcast- Welch.jpg

    Listen to Michael Welch and how to address fourth-party risks and improve supply chain security in our latest The Security Podcast episode

    See More
  • cybersecurity and phishing

    How hackers are using COVID-19 to find new phishing victims

    See More
  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    Digital Risk Protection Services – Understanding their value and how to select the right solution

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!