Magento says compromised sites haven't patched older vulnerabilities

Some Magento sites have been infected with the Neutrino exploit kit

Magento said Tuesday there does not appear to be a new vulnerability in its e-commerce platform that is causing some websites to become infected with the Neutrino exploit kit.

Some of the affected websites appear to not have patched a code execution vulnerability nicknamed the Shoplift Bug Patch, Magento's security team wrote in a blog post. A patch was released in February.

Other Magento-powered sites have not applied other patches, making them vulnerable.

The latest attack against Magento was highlighted by Malwarebytes and Sucuri, two security companies, who noticed attacks on the client and server sides.

The infected Magento sites contained malicious scripts that created iframes, which pulled content from the malicious domain "Guruincsite." That domain, which is blacklisted by Google, has been linked with the Neutrino exploit kit.

neutrino Malwarebytes

Malwarebytes showed how a person who lands on a compromised website running Magento is redirected to the Neutrino exploit kit

If encountered by someone browsing a website, exploit kits attack a computer, looking for software vulnerabilities in order to deliver malware. Hackers often try to plant code that triggers exposure to an exploit kit on legitimate, highly trafficked websites, as it creates an opportunity to infect many computers.

Malwarebytes saw client-side exploits coming from Neutrino that try to exploit Adobe Systems' Flash Player and installs malware called Andromeda/Gamarue, wrote Jerome Segura, a senior security researcher, on Sunday.

"Compromised machines can be harvested for financial credentials and also become part of a large botnet," he wrote.

Magento warned that even if all patches have been applied to the software, it's important to figure out if a website had been compromised prior to patching.

Even if a flaw has now been patched, it's possible the attackers created unauthorized administrative accounts, which would continue to give them access, Magento said.

Magento, which is owned by eBay, is an attractive target for attackers since it's used by a large number of companies, including Nike, Olympus and Ghirardelli Chocolate. It claims to be the most used software for the top 1 million websites ranked by Alexa.


Join the CSO newsletter!

Error: Please check your email address.

More about Adobe SystemseBayGoogleMalwarebytesNikeOlympus

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place