Cyber assaults on e-commerce programs are a frequent trend in 2023 as e-commerce businesses develop into a lot more omnichannel, they construct and deploy ever more more API interfaces, with menace actors regularly exploring more methods to exploit vulnerabilities. This is why frequent tests and ongoing monitoring are required to totally safeguard world-wide-web apps, determining weaknesses so they can be mitigated immediately.

In this short article, we will go over the new Honda e-commerce platform assault, how it happened, and its effect on the company and its shoppers. In addition, to the significance of software safety tests, we will also talk about the distinctive parts of vulnerability tests and its a variety of phases.

Ultimately, we will supply aspects on how a lengthy-time period preventative solution these kinds of as PTaaS can protect e-commerce corporations and the distinctions involving continual tests (PTaaS) and conventional pen screening.

The 2023 Honda E-commerce System Attack

Honda’s electric power gear, garden, yard, and maritime items commerce system contained an API flaw that enabled any one to ask for a password reset for any account.

The vulnerability was observed by researcher Eaton Zveare who lately learned a key safety flaw in Toyota’s provider portal. By resetting the password of better-amount accounts, a menace actor was presented with admin-degree facts access on the firm’s network without having restriction. If found out by a cybercriminal, this would have resulted in a large-scale information breach with large ramifications.

Zverare stated: “Broken/missing access controls built it attainable to accessibility all facts on the system, even when logged in as a examination account.”

This authorized the tester to entry the pursuing info:

  • Just about 24,000 buyer orders throughout all Honda dealerships from August of 2016 to March of 2023 this included the customer’s title, deal with, and mobile phone amount.
  • 1,091 active vendor web-sites with the potential to modify these web pages.
  • 3,588 seller customers/accounts – together with own particulars.
  • 11,034 purchaser emails – together with first and very last names.
  • 1,090 supplier e-mail.
  • Inside monetary stories for Honda.

With the above facts, cybercriminals could accomplish a assortment of pursuits, from phishing campaigns to social engineering attacks and offering facts illegally on the dim net. With this amount of access, malware could also be mounted on dealer internet websites to try to skim credit score cards.

How Was The Vulnerability Observed

On the Honda e-commerce platform, “” subdomains are assigned to registered dealers. Zveare discovered that the password reset API on 1 of Honda’s web sites, Electrical power Devices Tech Convey (PETE), was processing reset requests devoid of requiring the prior password.

A legitimate electronic mail deal with was uncovered through a YouTube online video that furnished a demo of the vendor dashboard applying a exam account. Once reset, these login credentials could be utilised on any Honda e-commerce subdomain login portal, giving entry to interior dealership info.

Next, the tester necessary to entry the accounts of genuine sellers without the need of the chance of detection and with out needing to reset the passwords of hundreds of accounts. To do this, Zveare positioned a JavaScript flaw on the platform, the sequential assignment of consumer IDs, and a absence of access safety. As these types of, reside accounts could be observed by incrementing the person ID by one until there weren’t any other success.

Eventually, the platform’s admin panel could be fully accessed by modifying an HTTP response to make it appear as if the exploited account was an admin.

On April 3, 2023, Honda described that all the bugs experienced been set just after the findings ended up to begin with claimed to them on March 16, 2023. Eaton Zveare been given no financial reward for his perform as the organization does not have a bug bounty system.

The Relevance of E-commerce Application Safety Screening

E-commerce application security tests is important to secure the personal and economic details of everyone connected to the application, together with shoppers, sellers, and sellers. The frequency of cyberattacks on e-commerce apps is high, this means satisfactory protection is needed to avoid knowledge breaches that can seriously injury the name of a organization and trigger fiscal loss.

Regulatory compliance in the e-commerce sector is also stringent, with data defense starting to be business enterprise-important to stay clear of economic penalties. An software requires far more than just the latest protection functions, each and every part wants to be tested and finest methods followed to acquire a robust cybersecurity system.

Cyber Threats For E-commerce Programs

  1. Phishing – Phishing is a form of social engineering attack that aims to trick victims into clicking a link to a malicious web-site or application. This is carried out by sending an e-mail or text that is made to seem as if it has been sent from a trusted resource, these types of as a financial institution or work colleague. Once on the destructive website, users may well enter information these as passwords or account figures that will be recorded.
  2. Malware/ Ransomware – After contaminated with malware, a array of routines can choose position on a procedure, this sort of as locking individuals out of their accounts. Cybercriminals then question for payment to re-grant access to accounts and devices – this is acknowledged as ransomware. However, there is a variety of malware that execute distinctive steps.
  3. E-Skimming – E-skimming steals credit card information and own details from payment card processing pages on e-commerce web-sites. This is attained by way of phishing attacks, brute drive attacks, XSS, or perhaps from a third-social gathering website remaining compromised.
  1. Cross-Site Scripting (XSS) – XSS injects malicious code into a webpage to target world wide web consumers. This code, usually Javascript, can file user input or keep an eye on web site exercise to get sensitive facts.
  1. SQL Injection – If an e-commerce software stores details in an SQL databases, then an SQL injection attack can input a destructive query that permits unauthorized accessibility to the database’s contents if it is not adequately secured. As effectively as getting ready to view details, it may perhaps also be achievable to manipulate it in some scenarios.

The Distinctive Spots of Vulnerability Tests

There are generally 8 critical spots of vulnerability screening, and their methodology can then be damaged down into 6 phases.

8 Spots of Vulnerability Screening

  • Internet Software-Based mostly Vulnerability Assessment
  • API-Dependent Vulnerability Evaluation
  • Community-Dependent Vulnerability Assessment
  • Host-Based mostly Vulnerability Evaluation
  • Actual physical Vulnerability Assessment
  • Wireless Network Vulnerability Assessment
  • Cloud-Centered Vulnerability Assessment
  • Social Engineering Vulnerability Assessment

The 6 Phases of Vulnerability Assessment Methodology

  1. Establish critical and large-risk assets
  2. Accomplish a vulnerability assessment
  3. Conduct vulnerability evaluation and threat assessment
  4. Remediate any vulnerability – E.G., implementing safety patches or repairing configuration issues.
  5. Evaluate how the procedure can be enhanced for optimal protection.
  6. Report the success of the assessment and the actions taken.

Pentesting As A Assistance (PTaaS)

Penetration Screening as a Support (PTaaS) is a shipping system for common and price-efficient penetration screening although also boosting collaboration concerning testing companies and their clientele. This will allow corporations and organizations to detect vulnerabilities more usually.

PTaaS vs. Regular Pen Screening

Regular penetration screening is finished on a contractual basis and often takes a significant total of time. This is why this kind of screening can only be carried out after or twice a 12 months. PTaaS, on the other hand, allows continuous testing, even as typically as each time code is altered. PTaaS performs ongoing, genuine-time assessments working with a combination of automatic scanning applications and guide methods. This provides a extra continual approach to safety needs and fills in the gaps that occur with annual testing.

Click on below to understand more about the positive aspects of PTaaS by requesting a reside demo of the SWAT platform developed by Outpost24.


Cyberattacks on e-commerce web-sites happen regularly, and even platforms constructed by worldwide enterprises these kinds of as Honda have contained significant vulnerabilities that have been found in the very last 12 months.

Safety tests is demanded to assess the total assault area of an e-commerce application, preserving both equally the company and its people from cyber attacks like phishing or e-skimming.

Penetration screening as a assistance is a single of the ideal techniques to safeguard platforms, carrying out standard scans to supply constant vulnerability assessments so they can be mitigated as soon as doable.

Found this write-up fascinating? Comply with us on Twitter and LinkedIn to study extra distinctive content we article.

By Sia