Malware & RansomwareHIGH

PolyShell Intrusions - Magento Stores Compromised

SCSC Media
PolyShellMagentoAdobe Commerce
🎯

Basically, many online stores using Magento got hacked by a sneaky malware called PolyShell.

Quick Summary

Over half of vulnerable Magento stores have been compromised by PolyShell intrusions. This malware threatens e-commerce security, urging immediate action from affected sites. Stay informed and protect your business.

What Happened

Recently, a significant security breach has been reported affecting Magento stores. Over 56.7% of all vulnerable e-commerce sites have fallen victim to PolyShell intrusions since exploitation began last week. This alarming statistic highlights the urgency of addressing vulnerabilities in the Adobe Commerce and Magento Open Source platforms. The exploit leverages weaknesses in Magento's REST API, allowing attackers to infiltrate systems and deploy malicious tools.

One notable incident involved a major automaker's e-commerce site, which was compromised by a new payment card skimmer. This skimmer uses advanced techniques, such as Web Real-Time Communication (WebRTC), to facilitate stealthy data exfiltration. By establishing a connection to a command-and-control server, the skimmer can receive further payloads, making detection challenging.

Who's Being Targeted

The primary targets of these intrusions are businesses using Adobe Commerce and Magento Open Source. As these platforms are widely used for e-commerce, the scale of the attack is concerning. Organizations running outdated versions of these platforms are particularly vulnerable. The PolyShell exploit has proven effective in compromising systems, and many businesses are now at risk of data theft and financial loss.

The attack's impact is not limited to just one sector; it spans various industries that rely on Magento for their online sales. As the threat landscape evolves, businesses must remain vigilant against such sophisticated attacks.

Signs of Infection

Detecting a PolyShell intrusion can be difficult, but there are some signs to watch out for. Businesses may notice unusual activity on their websites, such as unexpected transactions or unauthorized access attempts. Additionally, the presence of unfamiliar scripts or changes in website performance can indicate a compromise.

Organizations are advised to refer to Sansec's list of IP addresses associated with PolyShell scanning. This proactive measure can help identify potential threats before they escalate into full-blown attacks. Regular monitoring of web traffic and logs is crucial for early detection.

How to Protect Yourself

To safeguard against PolyShell intrusions, businesses must take immediate action. First, ensure that your Magento or Adobe Commerce platform is updated to the latest version, as PolyShell vulnerabilities have been addressed in version 2.4.9-beta1. However, a stable security update for production versions is still pending from Adobe.

In addition to updating software, organizations should implement robust security measures, such as firewalls and intrusion detection systems. Regular security audits and employee training on recognizing phishing attempts can further bolster defenses. By taking these steps, businesses can significantly reduce their risk of falling victim to such malware attacks.

🔒 Pro insight: The rapid exploitation of PolyShell underscores the need for timely patch management in e-commerce platforms.

Original article from

SC Media

Read Full Article

Related Pings

HIGHMalware & Ransomware

EtherRAT - New Malware Bypasses Security Using Ethereum

A new malware called EtherRAT is using Ethereum smart contracts to hide its control system. This clever tactic allows it to steal sensitive information from organizations, especially in retail. Companies need to be proactive to defend against such advanced threats.

Infosecurity Magazine·
HIGHMalware & Ransomware

GlassWorm Attack - Updated Campaign Uncovered with New Tactics

A new GlassWorm attack campaign has been uncovered, using fake Chrome extensions to steal sensitive information. Users on Windows and macOS are at risk. Stay vigilant and protect your data from these sophisticated threats.

SC Media·
HIGHMalware & Ransomware

Torg Grabber - New Malware Transitions to Encrypted C2 Infrastructure

A new malware called Torg Grabber has emerged, evolving from Telegram data exfiltration to a sophisticated encrypted C2. It targets various browsers, stealing sensitive credentials and posing significant risks. Users and organizations must stay vigilant against this growing threat.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Fake Screenshot Lures Target Web3 Support Staff

APT-Q-27 is targeting Web3 support teams with fake screenshot links that install multi-stage malware. This poses a serious risk to customer service operations and sensitive data. Organizations must stay vigilant and implement protective measures.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Major iPhone Hacking Tools Leaked Online

A significant leak of iPhone hacking tools, Coruna and DarkSword, poses a major risk to millions of users. Many devices remain vulnerable due to outdated software. Immediate updates are crucial to protect personal data from potential theft.

TechCrunch Security·
HIGHMalware & Ransomware

Malware - Silver Fox Exploits Stolen EV Certificates

Silver Fox, a Chinese APT group, exploits stolen EV certificates in a new malware campaign. Targeting Chinese-speaking users, this sophisticated attack poses serious risks. Security teams must stay vigilant against these evolving threats.

Cyber Security News·