Retail giant Target this week announced the open source availability of an internal tool designed for the detection of web skimming attacks.
Dubbed Merry Maker, the tool analyzes payment page code served to users and network traffic from test payment transactions to identify any malicious indicators. The company says it has been using the tool since 2018 to perform more than one million website scans.
In addition to simulating a real site visitor and saving the generated code and network activity for analysis, the utility searches for new and known malicious domains and creates an alert when any is identified. The tool supports Basic, Kafka, and GoAlert alerts.
[READ: New Open Source Tool Helps Identify EtherNet/IP Stacks for ICS Research]
All purchases made by Merry Maker are flagged as tests internally and are not processed, but all other operations are performed just as they would normally be during checkout.
The tool can also help identify data exfiltration attempts by running Yara rules, which also allows it to detect credit card numbers or specific data. Furthermore, it can capture the Document Object Model (DOM) state at any moment.
Merry Maker, which uses Puppeteer and Headless Chrome, was open sourced alongside several detection rules, but Target says the tool also allows for the addition of new detections via Typescript.
Related: Google, Adobe Announce New Open Source Security Tools
Related: RPC Firewall Dubbed ‘Ransomware Kill Switch’ Released to Open Source
Related: New Google Tool Helps Developers Visualize Dependencies of Open Source Projects