Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Magento Vulnerability Let Attackers Inject Backdoor

admin by admin
Apr 5, 2024
in News
A A
0

A sophisticated vulnerability within the Magento ecommerce platform has been unveiled, posing a significant threat to online merchants and shoppers alike. 

The vulnerability, identified as CVE-2024-20720, allows attackers to inject a persistent backdoor into Magento servers, compromising the security of countless ecommerce websites.

The method of attack involves a clever manipulation of Magento’s layout template system.

Attackers have been found to insert malicious XML code into the layout_update database table, which is then executed every time a customer accesses the checkout cart.

This execution relies on the combination of Magento’s layout parser with the beberlei/assert package, a component installed by default on Magento systems.

The specific command executed, sed, is used to add a backdoor to the CMS controller, ensuring that the malware is re-injected even after manual fixes or system recompilations.

Malicious Payloads Injection

This backdoor not only allows attackers to maintain access to the compromised systems but also facilitates the injection of additional malicious payloads.

One such payload observed by Sansec is a fake Stripe payment skimmer designed to steal payment information from unsuspecting shoppers.

The skimmer was found to transmit stolen data to a compromised Magento store, further highlighting the sophistication and reach of the attackers.

The attackers behind this campaign have been linked to several IP addresses, indicating a coordinated effort to exploit this vulnerability across multiple ecommerce sites.

The discovery of this vulnerability follows a surge in digital skimming activities, also known as Magecart attacks, which have been on the rise since 2015.

These attacks specifically target online shopping platforms to steal credit card data during the checkout process.

To mitigate the risk posed by this vulnerability, Sansec has issued recommendations for affected merchants.

Magento store owners must run the eComscan scanner, a tool designed to uncover hidden backdoors within their systems.

Additionally, upgrading Magento to versions 2.4.6-p4, 2.4.5-p6, or 2.4.4-p7 is advised to patch the vulnerability and protect against future attacks.

This incident serves as a stark reminder of the ever-present threats facing online merchants and the importance of maintaining up-to-date security measures. 

As attackers continue to evolve their tactics, the ecommerce industry must remain vigilant to safeguard the integrity of online shopping and the privacy of consumers worldwide.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.