Magento online stores hacked

In the largest attack against Magento sites, hackers breached nearly 2.000 online stores this weekend to steal .

Adobe Magento is a popular e-commerce platform that allows owners to quickly set up an online store to sell their products and accept credit cards.

Because of this, Magento is often targeted by hackers who try to install JavaScript in order to steal their customers' credit cards.

These types of attacks are called MageCart and have become quite a problem for Magento. So VISA advised marketers to switch e-commerce sites to the safer Magento 2.x.

Over the weekend, the company of credit card theft Sanguine Security (Sansec) identified 1.904 Magento stores that had been compromised in the last four days.

The attack began on Friday, when ten stores were infected with a credit card theft script that was not known from other attacks.

The attack increased to 1.058 sites on Saturday, another 603 on Sunday and an additional 233 by Monday morning.

According to Willem de Groot, the founder of Sanguine Security, this is the biggest attack on the Magento platform they have seen since they began monitoring e-commerce stores in 2015.

«Αυτή η επίθεση είναι μακράν η μεγαλύτερη που έχει εντοπίσει η Sansec από τότε που ξεκίνησε να παρακολουθεί την πλατφόρμα το 2015. Το προηγούμενο ρεκόρ ήταν 962 παραβιασμένα καταστήματα σε μια μέρα τον Ιούλιο του περασμένου έτους”, δήλωσε ο de Groot σε released today.

Of the compromised stores, the majority were Magento version 1, which no longer receives security since June 2020 when it reached the end of its support.

When it was breached, de Groot said the attackers were installing a PHP web shell called mysql.php and allowing them to gain full access to the breached account.

Using this access, hackers installed JavaScript to download malicious credit card theft code from mcdnn.net/122002/assets/js/widget.js when a visitor is on a purchase completion page.

When payment information is submitted, payment information is collected from the script and sent to the address https://imags.pw/502.jsp which is under the control of the hacker.

For infringed Magento sites in version 1, the malicious script was added to the prototype.js file. For Magento 2 sites, added to a file jquery.js.

It is unknown at this time what he will do after leaving the post, but Sansec believes that sites that use Magento 1 may be compromised using a 0day security loophole sold to hacking forums.

On August 15, a hacker named z3r0day started selling 0day security vulnerabilities for both of Magento 1 fixes for $ 5.000. This sale was made to a total of ten people.

Sansec continues to investigate the attacks to determine how the sites were compromised, but advises all Magento users to in Magento 2 for greater protection.

Sansec recently partnered with Adobe to help resolve the issue.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).