<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom">
 <title>Sansec - experts in eCommerce security</title>
 <link href="https://sansec.io/atom.xml" rel="self"/>
 <link href="https://sansec.io/"/>
 <updated>2024-06-27T08:33:17Z</updated>
 <id>https://sansec.io/</id>
 <author>
   <name>Sansec</name>
   <email>info@sansec.io</email>
 </author>
 
 <entry>
   <title>Criminals have rewired 3,500 online stores</title>
   <link href="https://sansec.io/research/widespread-credit-card-hijacking-discovered"/>
   <id>https://sansec.io/research/widespread-credit-card-hijacking-discovered</id>
   <updated>2015-11-17T00:00:00Z</updated>
   <content type="text">Criminals have secretly rewired 3,500 online stores to continuously harvest credit card numbers. The fraud can be traced back as far as May 12th 2015, so if you have bought something at one of thes...</content>
 </entry>

 <entry>
   <title>Visbot malware found on 6691 stores [analysis]</title>
   <link href="https://sansec.io/research/visbot-malware-on-6691-stores-analysis"/>
   <id>https://sansec.io/research/visbot-malware-on-6691-stores-analysis</id>
   <updated>2016-12-01T00:00:00Z</updated>
   <content type="text">Visbot is one of the oldest Magecart payment skimmers: it steals customer data and credit cards. The first case was documented as early as March 2015. But being publicly discussed did not stop it ...</content>
 </entry>

 <entry>
   <title>Self-healing malware restores itself after deletion</title>
   <link href="https://sansec.io/research/triggered-malware"/>
   <id>https://sansec.io/research/triggered-malware</id>
   <updated>2017-02-14T00:00:00Z</updated>
   <content type="text">Regular Javascript-based malware is normally injected in the static header or footer HTML definitions in the database. Cleaning these records used to be sufficient to get rid of the malware. But n...</content>
 </entry>

 <entry>
   <title>An OpenCart/Magento hacking dashboard</title>
   <link href="https://sansec.io/research/magento-bruteforce-dashboard"/>
   <id>https://sansec.io/research/magento-bruteforce-dashboard</id>
   <updated>2017-04-07T00:00:00Z</updated>
   <content type="text">This post shows how sophisticated Magento hacking operations have become nowadays.While investigating a bruteforced Magento store, we noticed that the hacker logged in using a curious referrer sit...</content>
 </entry>

 <entry>
   <title>A Magento breach analysis: part 1</title>
   <link href="https://sansec.io/research/magento-breach-analysis"/>
   <id>https://sansec.io/research/magento-breach-analysis</id>
   <updated>2017-04-12T00:00:00Z</updated>
   <content type="text">Part of a series where Magento security professionals share their case notes, so that we can ultimately distill a set of best practices, tools and workflow.Part of the job of running the MageRepo...</content>
 </entry>

 <entry>
   <title>Warning: fake Magento patch 9789 contains virus</title>
   <link href="https://sansec.io/research/fake-magento-patch-9789-is-virus"/>
   <id>https://sansec.io/research/fake-magento-patch-9789-is-virus</id>
   <updated>2017-04-21T00:00:00Z</updated>
   <content type="text">Update May 21st: a similar phishing mail circulates about a fake patch SUPEE-1798.Update Apr 22nd: added reference to Neutrino Bot and POS systemsThis week a mail was sent out to announce the n...</content>
 </entry>

 <entry>
   <title>Why ordering HTTP headers is important</title>
   <link href="https://sansec.io/research/http-header-order-is-important"/>
   <id>https://sansec.io/research/http-header-order-is-important</id>
   <updated>2017-05-02T00:00:00Z</updated>
   <content type="text">If you code against Akamai hosted sites, you could be rejected because your HTTP library sends request headers in the wrong order. In fact, most libraries use undefined order, as the IETF specifica...</content>
 </entry>

 <entry>
   <title>Cryptojacking found on 2496 online stores</title>
   <link href="https://sansec.io/research/cryptojacking-found-on-2496-stores"/>
   <id>https://sansec.io/research/cryptojacking-found-on-2496-stores</id>
   <updated>2017-11-07T00:00:00Z</updated>
   <content type="text">Does your laptop get hot when visiting your favorite shop? You computer is likely mining cryptocurrencies to the benefit of a cyberthief.Cryptojacking - running crypto mining software in the brow...</content>
 </entry>

 <entry>
   <title>Hackers breached Magento through helpdesk</title>
   <link href="https://sansec.io/research/hackers-breach-magento-through-helpdesk"/>
   <id>https://sansec.io/research/hackers-breach-magento-through-helpdesk</id>
   <updated>2017-12-28T00:00:00Z</updated>
   <content type="text">Magento merchants have recently received messages like this:Hey, I strongly recommend you to make a redesign! Please contact me if you need a good designer! -- knockers@yahoo.comUpon closer exa...</content>
 </entry>

 <entry>
   <title>MagentoCore group hacks 7,339 stores and counting</title>
   <link href="https://sansec.io/research/magentocore.net-skimmer-most-aggressive-to-date"/>
   <id>https://sansec.io/research/magentocore.net-skimmer-most-aggressive-to-date</id>
   <updated>2018-08-30T00:00:00Z</updated>
   <content type="text">A single group is responsible for planting skimmers on 7339 individual stores in the last 6 months. The MagentoCore skimmer is now the most successful to date.Update 2018-09-07: Because Google Chr...</content>
 </entry>

 <entry>
   <title>Is your Google Analytics code malicious?</title>
   <link href="https://sansec.io/research/fake-google-analytics-malware"/>
   <id>https://sansec.io/research/fake-google-analytics-malware</id>
   <updated>2018-09-06T00:00:00Z</updated>
   <content type="text">Would you - a webdeveloper - get alarmed if you found the following code on your website? Probably not, as Google Analytics is embedded in pretty much every website these days:&amp;lt;script type=&amp;quo...</content>
 </entry>

 <entry>
   <title>ABS-CBN next in series of high profile breaches</title>
   <link href="https://sansec.io/research/abs-cbn.com-hacked"/>
   <id>https://sansec.io/research/abs-cbn.com-hacked</id>
   <updated>2018-09-18T00:00:00Z</updated>
   <content type="text">While Filipinos are recovering from typhoon Mangkhut, another misfortune awaits them online. We found their broadcasting giant ABS-CBN − a $740 million conglomerate &amp;amp; top-500 global Internet de...</content>
 </entry>

 <entry>
   <title>MageCart: now with tripwire</title>
   <link href="https://sansec.io/research/magecart-tripwire"/>
   <id>https://sansec.io/research/magecart-tripwire</id>
   <updated>2018-10-04T00:00:00Z</updated>
   <content type="text">Back in 2016, Magecart skimmers would evade detection by sleeping if any developer tools were found running. Then, their malware would 404 without correct Referer or User-Agent header. And now, Ma...</content>
 </entry>

 <entry>
   <title>German political party store hacked before election</title>
   <link href="https://sansec.io/research/csu-shop-magecarted"/>
   <id>https://sansec.io/research/csu-shop-magecarted</id>
   <updated>2018-10-15T00:00:00Z</updated>
   <content type="text">The store of German political party CSU (www.csu-shop.de) contains an identity skimmer that was planted on or before Oct 5th, right before the Bavarian election on Oct 14th. Personal identifyable ...</content>
 </entry>

 <entry>
   <title>Unpublished security flaws (0days) massively exploited</title>
   <link href="https://sansec.io/research/magecart-extension-0days"/>
   <id>https://sansec.io/research/magecart-extension-0days</id>
   <updated>2018-10-23T00:00:00Z</updated>
   <content type="text">Online credit card theft has been all over the news: criminals inject hidden card stealers on legitimate checkout pages. But how are they are able to inject anything in the first place? As it turn...</content>
 </entry>

 <entry>
   <title>Backdoor found in Webgility</title>
   <link href="https://sansec.io/research/webgility-backdoor"/>
   <id>https://sansec.io/research/webgility-backdoor</id>
   <updated>2018-10-30T00:00:00Z</updated>
   <content type="text">Update Nov 23rd: Webgility has released a patch and a public statement, urging all customers to upgrade to version 345.Update Nov 30th: Webgility has discovered another security issue and urges a...</content>
 </entry>

 <entry>
   <title>Merchants struggle with MageCart reinfections</title>
   <link href="https://sansec.io/research/merchants-struggle-with-magecart-reinfections"/>
   <id>https://sansec.io/research/merchants-struggle-with-magecart-reinfections</id>
   <updated>2018-11-12T00:00:00Z</updated>
   <content type="text">1 in 5 compromised merchants get reinfected, average skimming operation lasts 13 daysMageCart, the notorious actors behind massive online card skimming, has been busy. And so have we: our crawlers...</content>
 </entry>

 <entry>
   <title>Competing digital skimmers sabotage each other</title>
   <link href="https://sansec.io/research/warring-magecart-factions"/>
   <id>https://sansec.io/research/warring-magecart-factions</id>
   <updated>2018-11-20T00:00:00Z</updated>
   <content type="text">Skimmers found to subtly sabotage each others fraud operations.Competition is grim in the online skimming business (aka &amp;quot;MageCart&amp;quot;). The aggressive MagentoCore skimmer was previously ob...</content>
 </entry>

 <entry>
   <title>PHP tool &#39;Adminer&#39; leaks passwords</title>
   <link href="https://sansec.io/research/adminer-4.6.2-file-disclosure-vulnerability"/>
   <id>https://sansec.io/research/adminer-4.6.2-file-disclosure-vulnerability</id>
   <updated>2019-01-17T00:00:00Z</updated>
   <content type="text">Update 2019-01-20: the root cause is a protocol flaw in MySQL.Adminer is a popular PHP tool to administer MySQL and PostgreSQL databases. However, it can be lured to disclose arbitrary files. Atta...</content>
 </entry>

 <entry>
   <title>Large sites hacked via Adminer database tool</title>
   <link href="https://sansec.io/research/sites-hacked-via-mysql-protocal-flaw"/>
   <id>https://sansec.io/research/sites-hacked-via-mysql-protocal-flaw</id>
   <updated>2019-01-20T00:00:00Z</updated>
   <content type="text">This week I discovered that large ecommerce and government sites got hacked via the Adminer database tool. As it turns out, the root cause is a protocol flaw in MySQL. Curiously, it is described in...</content>
 </entry>

 <entry>
   <title>Bad extensions now main source of Magento hacks: a solution!</title>
   <link href="https://sansec.io/research/magento-module-blacklist"/>
   <id>https://sansec.io/research/magento-module-blacklist</id>
   <updated>2019-01-29T00:00:00Z</updated>
   <content type="text">In October last year I discovered several Magento extension 0days. As it turns out, this was only the tip of the iceberg: today, insecure 3rd party extensions are used to hack into thousands of sto...</content>
 </entry>

 <entry>
   <title>Credit cards of Atlanta Hawks fans stolen</title>
   <link href="https://sansec.io/research/atlanta-hawks-magecart"/>
   <id>https://sansec.io/research/atlanta-hawks-magecart</id>
   <updated>2019-04-24T00:00:00Z</updated>
   <content type="text">MageCart attacks on online stores surged last year, culminating in the hack of British Airways and Ticketmaster. This year the trend continues with another high-profile target. The Atlanta Hawks sh...</content>
 </entry>

 <entry>
   <title>57 payment gateways from Germany to Brazil targeted</title>
   <link href="https://sansec.io/research/polymorphic-skimmer-57-payment-gateways"/>
   <id>https://sansec.io/research/polymorphic-skimmer-57-payment-gateways</id>
   <updated>2019-04-29T00:00:00Z</updated>
   <content type="text">Sansec discovered a polymorphic skimmer that works with 57 different payment gateways. It has global reach, affecting payment systems from Germany to Brazil. It is by far the most advanced skimmer ...</content>
 </entry>

 <entry>
   <title>Sports brand Puma infected with advanced malware</title>
   <link href="https://sansec.io/research/puma-magecart"/>
   <id>https://sansec.io/research/puma-magecart</id>
   <updated>2019-04-29T00:00:00Z</updated>
   <content type="text">After the NBA Hawks got skimmed last week, this time Puma&#39;s Australian customers are cannon fodder for Magecart thieves. Anyone who ordered a pair of sneakers online, had their name, address and cr...</content>
 </entry>

 <entry>
   <title>Critical Magento 2 flaw exploited within 16 hours</title>
   <link href="https://sansec.io/research/magento-2-hacks"/>
   <id>https://sansec.io/research/magento-2-hacks</id>
   <updated>2019-05-10T00:00:00Z</updated>
   <content type="text">The number of hacked Magento 2 stores spiked in the last four weeks, after a critical security flaw was discovered in March and criminals stole admin passwords within 16 hours. Merchants are advise...</content>
 </entry>

 <entry>
   <title>PCI-SSC/RHISAC quote Sansec: 20% stores reinfected</title>
   <link href="https://sansec.io/research/pci-rhisac-use-sansec-research"/>
   <id>https://sansec.io/research/pci-rhisac-use-sansec-research</id>
   <updated>2019-08-01T00:00:00Z</updated>
   <content type="text">The PCI Security Standards Council and the Retail &amp;amp; Hospitality ISAC alert merchants to the threat of digital skimming. In its report, it quotes Sansec research, which has found that about 20% ...</content>
 </entry>

 <entry>
   <title>Sansec at Europol training: 50,000+ stores hacked</title>
   <link href="https://sansec.io/research/sansec-europol-training-payment-fraud"/>
   <id>https://sansec.io/research/sansec-europol-training-payment-fraud</id>
   <updated>2019-08-12T00:00:00Z</updated>
   <content type="text">Cementing itself as a global force in the protection against eCommerce fraud, Sansec has been invited to speak at the fifth edition of Europol’s Training Course on Payment Card Fraud Forensic Inves...</content>
 </entry>

 <entry>
   <title>FBI recommends eCommerce malware protection</title>
   <link href="https://sansec.io/research/fbi-urges-malware-protection"/>
   <id>https://sansec.io/research/fbi-urges-malware-protection</id>
   <updated>2019-08-17T00:00:00Z</updated>
   <content type="text">The FBI warns small and medium-sized businesses and government agencies against the threat of e-skimming. E-skimming occurs when cyber criminals inject malicious code onto a website.Read the origi...</content>
 </entry>

 <entry>
   <title>Magento security extentions vendor got hacked</title>
   <link href="https://sansec.io/research/magento-plugin-vendor-compromised"/>
   <id>https://sansec.io/research/magento-plugin-vendor-compromised</id>
   <updated>2019-10-07T00:00:00Z</updated>
   <content type="text">The store of a US Magento extension vendor was found compromised. Attackers had write access to the server selling extensions. We are awaiting a statement on the integrity of downloaded software.O...</content>
 </entry>

 <entry>
   <title>American Cancer Society hit by payment skimmer</title>
   <link href="https://sansec.io/research/american-cancer-society-magecart"/>
   <id>https://sansec.io/research/american-cancer-society-magecart</id>
   <updated>2019-10-25T00:00:00Z</updated>
   <content type="text">Digital skimming groups (aka Magecart) hit another low, as they successfully targeted the American Cancer Society last night. Our skimmer detectors found a piece of malicious code embedded on the C...</content>
 </entry>

 <entry>
   <title>Payment skimmers have impersonated Sansec</title>
   <link href="https://sansec.io/research/magecart-hackers-target-sanguine"/>
   <id>https://sansec.io/research/magecart-hackers-target-sanguine</id>
   <updated>2019-12-02T00:00:00Z</updated>
   <content type="text">Payment skimmers are hiding their malpractice by impersonating our Sansec anti-skimming service. They have registered malicious domains sansec.us and sanguinelab.net, even using a fake address in A...</content>
 </entry>

 <entry>
   <title>Indonesian Magecart hackers arrested</title>
   <link href="https://sansec.io/research/magecart-hackers-arrested"/>
   <id>https://sansec.io/research/magecart-hackers-arrested</id>
   <updated>2020-01-25T00:00:00Z</updated>
   <content type="text">The Indonesian police announced on Friday that they have arrested three alleged Magecart hackers on December 20th. The suspects are from Jakarta and Yogyakarta and are 23, 26 and 35 years old. Afte...</content>
 </entry>

 <entry>
   <title>Maxcluster and Sansec partner to secure German stores</title>
   <link href="https://sansec.io/research/sanguine-maxcluster-partnership"/>
   <id>https://sansec.io/research/sanguine-maxcluster-partnership</id>
   <updated>2020-02-20T00:00:00Z</updated>
   <content type="text">Utrecht, February 20; Sansec is proud to announce that it hasformed a long-term strategic partnership with maxcluster to bring itsindustry-leading anti-malware technology to the German e-commerce...</content>
 </entry>

 <entry>
   <title>Sansec reveals longest Magecart skimming operation to date [Analysis]</title>
   <link href="https://sansec.io/research/longest-skimming-operation-yet"/>
   <id>https://sansec.io/research/longest-skimming-operation-yet</id>
   <updated>2020-02-25T00:00:00Z</updated>
   <content type="text">Sansec, a global leader in eCommerce security, reveals that hackers successfully infiltrated an online printing platform for more than two and a half years. Our research shows that crooks ran keylo...</content>
 </entry>

 <entry>
   <title>Magento 1 still PCI compliant after 1 July 2020?</title>
   <link href="https://sansec.io/research/magento-1-pci-compliance"/>
   <id>https://sansec.io/research/magento-1-pci-compliance</id>
   <updated>2020-05-08T00:00:00Z</updated>
   <content type="text">Magento 1 will no longer receive official updates &amp;amp; security fixes per July 1st, 2020 (the end-of-life, or EOL date). Merchants are urged to upgrade to Magento 2, but for many stores this deadl...</content>
 </entry>

 <entry>
   <title>Do these two things to keep your Magento 1 store running after June</title>
   <link href="https://sansec.io/research/magento-1-beyond-june"/>
   <id>https://sansec.io/research/magento-1-beyond-june</id>
   <updated>2020-05-28T00:00:00Z</updated>
   <content type="text">Over a 100 thousands Magento 1 stores will be running after Adobe terminates support in June (end-of-life). Many merchants need more time to transition to Magento 2 or another platform. No need to ...</content>
 </entry>

 <entry>
   <title>Lockdown: Stores closed, online stores hacked</title>
   <link href="https://sansec.io/research/magecart-corona-lockdown"/>
   <id>https://sansec.io/research/magecart-corona-lockdown</id>
   <updated>2020-06-15T00:00:00Z</updated>
   <content type="text">While an international retail chain closed its physical stores, attackers hacked its online presence, Sansec research shows. Following common Magecart malpractice, payment skimmers were injected an...</content>
 </entry>

 <entry>
   <title>Digital skimmer runs entirely on Google, defeats CSP</title>
   <link href="https://sansec.io/research/skimming-google-defeats-csp"/>
   <id>https://sansec.io/research/skimming-google-defeats-csp</id>
   <updated>2020-06-22T00:00:00Z</updated>
   <content type="text">A newly discovered skimming campaign runs entirely on Google servers, Sansec research shows. The novel malware sends stolen credit cards directly to Google Analytics, evading security controls like...</content>
 </entry>

 <entry>
   <title>North Korean hackers are skimming US and European shoppers</title>
   <link href="https://sansec.io/research/north-korea-magecart"/>
   <id>https://sansec.io/research/north-korea-magecart</id>
   <updated>2020-07-06T00:00:00Z</updated>
   <content type="text">Previously, North Korean hacking activity was mostly restricted to banks and South Korean crypto markets^cryptohack, covert cyber operations that earned hackers $2 billion, according to a 2019 Unit...</content>
 </entry>

 <entry>
   <title>Cardbleed: 3% of Magento install base hacked</title>
   <link href="https://sansec.io/research/cardbleed"/>
   <id>https://sansec.io/research/cardbleed</id>
   <updated>2020-09-14T00:00:00Z</updated>
   <content type="text">Update Sept 18: Cardbleed has infected 2806 Magento1 stores so far (3% of total install base)Over the weekend, almost two thousand Magento 1 stores across the world have been hacked in the larges...</content>
 </entry>

 <entry>
   <title>Payment skimmer hides in social media buttons</title>
   <link href="https://sansec.io/research/svg-malware"/>
   <id>https://sansec.io/research/svg-malware</id>
   <updated>2020-11-26T00:00:00Z</updated>
   <content type="text">Researchers at Sansec have uncovered a novel technique to inject payment skimmers onto checkout pages. This new malware has two parts: a concealed payload and a decoder, of which the latter reads t...</content>
 </entry>

 <entry>
   <title>Hackers exploit security flaw right before Black Friday</title>
   <link href="https://sansec.io/research/magento-2-persistent-parasite"/>
   <id>https://sansec.io/research/magento-2-persistent-parasite</id>
   <updated>2020-12-02T00:00:00Z</updated>
   <content type="text">The affected stores were all running the older Magento 2.2, which is unsupported since December 2019.In addition to the injected flaw, attackers used a hybrid skimming architecture, with front and...</content>
 </entry>

 <entry>
   <title>eCommerce trojan accidentally leaks victims</title>
   <link href="https://sansec.io/research/ecommerce-rat-leaks-victims"/>
   <id>https://sansec.io/research/ecommerce-rat-leaks-victims</id>
   <updated>2020-12-18T00:00:00Z</updated>
   <content type="text">Sansec discovered a clever remote access trojan (RAT) that has been hiding in the alleys of hacked eCommerce servers. Despite the advanced setup, perpetrators mistakenly left a list of victim store...</content>
 </entry>

 <entry>
   <title>Fake payment page before checkout on Shopify and BigCommerce</title>
   <link href="https://sansec.io/research/skimmer-dynamic-exfiltration-shopify-bigcommerce"/>
   <id>https://sansec.io/research/skimmer-dynamic-exfiltration-shopify-bigcommerce</id>
   <updated>2020-12-24T00:00:00Z</updated>
   <content type="text">Once the data is intercepted and exfiltrated, the attackers display an error message and the customer is redirected to the real payment page. Customers probably just enter their details again and i...</content>
 </entry>

 <entry>
   <title>Google Apps Script used to steal data</title>
   <link href="https://sansec.io/research/google-apps-script"/>
   <id>https://sansec.io/research/google-apps-script</id>
   <updated>2021-02-18T00:00:00Z</updated>
   <content type="text">The Google business application platform Apps Script is used to funnel stolen personal data, Sansec learned. Attackers use the reputation of the trusted Google domain script.google.com to evade mal...</content>
 </entry>

 <entry>
   <title>Case Study: How eCommerce Hackers Silently Steal Credit Card Data</title>
   <link href="https://sansec.io/research/how-magento-hackers-silently-steal-credit-card-data"/>
   <id>https://sansec.io/research/how-magento-hackers-silently-steal-credit-card-data</id>
   <updated>2021-05-03T00:00:00Z</updated>
   <content type="text">This is what happened to one of our clients. Due to his attentiveness - and a bit of luck! - this merchant noticed some abnormalities in his store’s code. He wasn’t using our malware scanning techn...</content>
 </entry>

 <entry>
   <title>New linux_avp malware hits eCommerce sites</title>
   <link href="https://sansec.io/research/ecommerce-malware-linux-avp"/>
   <id>https://sansec.io/research/ecommerce-malware-linux-avp</id>
   <updated>2021-11-18T00:00:00Z</updated>
   <content type="text">A merchant recently reached out to us, after hiring two forensic companies but still having malware on his store. As we appreciate a challenge, our team got started and quickly discovered an intric...</content>
 </entry>

 <entry>
   <title>CronRAT malware hides behind February 31st</title>
   <link href="https://sansec.io/research/cronrat"/>
   <id>https://sansec.io/research/cronrat</id>
   <updated>2021-11-24T00:00:00Z</updated>
   <content type="text">At this time of year we typically see a surge in eCommerce attacks and new malware. Last week we analyzed a clever malware attacking online stores, and today we expose another, much more sophistica...</content>
 </entry>

 <entry>
   <title>NginRAT parasite targets Nginx</title>
   <link href="https://sansec.io/research/nginrat"/>
   <id>https://sansec.io/research/nginrat</id>
   <updated>2021-12-01T00:00:00Z</updated>
   <content type="text">Last week we exposed the CronRAT eCommerce malware, which is controlled by a Chinese server. Out of curiosity, we wrote a &amp;quot;custom&amp;quot; RAT client and waited for commands from the far east. Ev...</content>
 </entry>

 <entry>
   <title>Magento and the Log4j vulnerability</title>
   <link href="https://sansec.io/research/magento-log4j-log4shell"/>
   <id>https://sansec.io/research/magento-log4j-log4shell</id>
   <updated>2021-12-13T00:00:00Z</updated>
   <content type="text">Updated Dec 20th. This article describes how Magento is affected by the critical log4j vulnerability, and what you can (and should) do to prevent a hack.A critical vulnerability in the popular Log...</content>
 </entry>

 <entry>
   <title>NaturalFreshMall: a Magento Mass Hack</title>
   <link href="https://sansec.io/research/naturalfreshmall-mass-hack"/>
   <id>https://sansec.io/research/naturalfreshmall-mass-hack</id>
   <updated>2022-02-08T00:00:00Z</updated>
   <content type="text">More than 350 ecommerce stores infected with malware in a single day.Today our global crawler discovered 374 ecommerce stores infected with the same strain of malware. 370 of these stores load the ...</content>
 </entry>

 <entry>
   <title>Magento 2 critical vulnerability (CVE-2022-24086 &amp; CVE-2022-24087)</title>
   <link href="https://sansec.io/research/magento-2-cve-2022-24086"/>
   <id>https://sansec.io/research/magento-2-cve-2022-24086</id>
   <updated>2022-02-14T00:00:00Z</updated>
   <content type="text">Update Feb 21st, 2022: Sansec has observed the first actual attacks in the wild. Patch now! Unfortunately, this validates our previous prediction that abuse would start within days. Attacks are com...</content>
 </entry>

 <entry>
   <title>Magento vendor Fishpig hacked, backdoors added</title>
   <link href="https://sansec.io/research/rekoobe-fishpig-magento"/>
   <id>https://sansec.io/research/rekoobe-fishpig-magento</id>
   <updated>2022-09-13T00:00:00Z</updated>
   <content type="text">Update 2022-09-13 FishPig has confirmed the incident and published a status page. It recommends customers to upgrade and/or reinstall all FishPig modules.Sansec discovered malware in the Fishpig ...</content>
 </entry>

 <entry>
   <title>Surge in Magento 2 template attacks</title>
   <link href="https://sansec.io/research/magento-2-template-attacks"/>
   <id>https://sansec.io/research/magento-2-template-attacks</id>
   <updated>2022-09-22T00:00:00Z</updated>
   <content type="text">Currently, Sansec eComscan is the only malware scanner that detects the injected remote access trojan (see Virustotal).223sam.jpg attackAll of the observed attacks have been interactive, possibly...</content>
 </entry>

 <entry>
   <title>Extortion of Magento merchants</title>
   <link href="https://sansec.io/research/extortion-magento-bitcoin"/>
   <id>https://sansec.io/research/extortion-magento-bitcoin</id>
   <updated>2022-11-07T00:00:00Z</updated>
   <content type="text">Related: many stores are occassionally contacted by &amp;quot;security researchers&amp;quot; who claim to have found a vulnerability and want a &amp;quot;bounty&amp;quot; to disclose it. In 99% of these cases, the...</content>
 </entry>

 <entry>
   <title>Adobe Commerce merchants to be hit with TrojanOrders this season</title>
   <link href="https://sansec.io/research/trojanorder-magento"/>
   <id>https://sansec.io/research/trojanorder-magento</id>
   <updated>2022-11-15T00:00:00Z</updated>
   <content type="text">After a quiet summer, the number of attacks targeting the mail template vulnerability in Magento 2 and Adobe Commerce is rising fast. Merchants and developers should be on the lookout for TrojanOrd...</content>
 </entry>

 <entry>
   <title>Fake Klaviyo accounts added to Magento</title>
   <link href="https://sansec.io/research/fake-klaviyo-accounts-added-to-magento"/>
   <id>https://sansec.io/research/fake-klaviyo-accounts-added-to-magento</id>
   <updated>2022-12-21T00:00:00Z</updated>
   <content type="text">Magento 2 template hacks have been raging since a month or two, and Sansec is closely tracking any new attack payloads. So far, we observed about 20 different payloads which all added a basic PHP b...</content>
 </entry>

 <entry>
   <title>Vendors defeat Magento security patch (+ simple check)</title>
   <link href="https://sansec.io/research/vendors-defeat-magento-security-patch-simple-check"/>
   <id>https://sansec.io/research/vendors-defeat-magento-security-patch-simple-check</id>
   <updated>2023-01-17T00:00:00Z</updated>
   <content type="text">BackgroundAdobe’s fix to CVE-2022-24086 was to remove “smart” mail templates. Many vendors were caught off guard and had to revert to the original functionality. In doing so, they unknowingly expo...</content>
 </entry>

 <entry>
   <title>Sansec analysis: 12% of online stores leak private backups</title>
   <link href="https://sansec.io/research/sansec-analysis-12-of-online-stores-leak-private-backups"/>
   <id>https://sansec.io/research/sansec-analysis-12-of-online-stores-leak-private-backups</id>
   <updated>2023-02-07T00:00:00Z</updated>
   <content type="text">It is a common practice to make ad-hoc backups during store platform maintenance. The problem, however, is that these backups often end up in a public folder. Perhaps the administrator intended to ...</content>
 </entry>

 <entry>
   <title>Postponed Exfiltration Evades Detection</title>
   <link href="https://sansec.io/research/postponed-exfiltration-evades-detection"/>
   <id>https://sansec.io/research/postponed-exfiltration-evades-detection</id>
   <updated>2023-05-09T00:00:00Z</updated>
   <content type="text">The domain gtag-analytics.com has recently emerged as a threat, employing various cunning techniques to evade detection and targeting unsuspecting users, but what makes it especially deceptive is i...</content>
 </entry>

 <entry>
   <title>Malware Persistence via Telegram and GitHub</title>
   <link href="https://sansec.io/research/malware-persistence-via-telegram-and-github"/>
   <id>https://sansec.io/research/malware-persistence-via-telegram-and-github</id>
   <updated>2023-08-22T00:00:00Z</updated>
   <content type="text">Attackers are devising ingenious methods to prolong their skimming activities, aiming for sustained persistence.The usual tactics, techniques, and procedures (TTP) include the creation of disposab...</content>
 </entry>

 <entry>
   <title>Is your store’s newsletter being used for phishing?</title>
   <link href="https://sansec.io/research/is-your-stores-newsletter-being-used-for-phishing"/>
   <id>https://sansec.io/research/is-your-stores-newsletter-being-used-for-phishing</id>
   <updated>2023-11-10T00:00:00Z</updated>
   <content type="text">Cybercriminals in eCommerce are diversifying their targets, now aiming at entire customer databases instead of just stealing credit cards. A recent incident revealed this trend: a hacked Magento ad...</content>
 </entry>

 <entry>
   <title>Magento wish list exploit bypasses WAF protection</title>
   <link href="https://sansec.io/research/magento-wish-list-exploits"/>
   <id>https://sansec.io/research/magento-wish-list-exploits</id>
   <updated>2023-12-18T00:00:00Z</updated>
   <content type="text">In recent weeks, Sansec observed a spike in hacked Magento 2 stores. Our investigations led to a (likely) single attacker, who used a combination of clever techniques to bypass WAFs and competing t...</content>
 </entry>

 <entry>
   <title>Sansec and Europol counter online skimming</title>
   <link href="https://sansec.io/research/europol-sansec-action"/>
   <id>https://sansec.io/research/europol-sansec-action</id>
   <updated>2024-01-09T00:00:00Z</updated>
   <content type="text">In a strategic alliance, Europol, the European Union Agency for Cybersecurity (ENISA), law enforcement from 17 nations, and key private sector entities such as Sansec, have aligned to counteract th...</content>
 </entry>

 <entry>
   <title>Sansec joins forces with Google&#39;s VirusTotal</title>
   <link href="https://sansec.io/research/virustotal-sansec"/>
   <id>https://sansec.io/research/virustotal-sansec</id>
   <updated>2024-03-08T00:00:00Z</updated>
   <content type="text">In January we announced our partnership with Europol and today, we are proud to be recognized by Google as experts in eCommerce security.Sansec and Google have agreed on a data exchange and we tru...</content>
 </entry>

 <entry>
   <title>Persistent Magento backdoor hidden in XML</title>
   <link href="https://sansec.io/research/magento-xml-backdoor"/>
   <id>https://sansec.io/research/magento-xml-backdoor</id>
   <updated>2024-04-04T00:00:00Z</updated>
   <content type="text">The following XML code was found in the layout_update database table and is responsible for periodic reinfections of your system.Attackers combine the Magento layout parser with the beberlei/asse...</content>
 </entry>

 <entry>
   <title>CosmicSting attack threatens 75% of Adobe Commerce stores</title>
   <link href="https://sansec.io/research/cosmicsting-unpatched"/>
   <id>https://sansec.io/research/cosmicsting-unpatched</id>
   <updated>2024-06-18T00:00:00Z</updated>
   <content type="text">Update June 27th: Adobe has now provided an official, isolated fix that can be applied to installations without requiring upgrade.Update June 27th: our partner Hypernode as actually observed the ...</content>
 </entry>

 <entry>
   <title>Polyfill supply chain attack hits 100K+ sites</title>
   <link href="https://sansec.io/research/polyfill-supply-chain-attack"/>
   <id>https://sansec.io/research/polyfill-supply-chain-attack</id>
   <updated>2024-06-25T00:00:00Z</updated>
   <content type="text">  Update June 28th: We are flagging more domains that have been used by the same actor to spread malware since at least June 2023: bootcdn.net, bootcss.com, staticfile.net, staticfile.org, unionad...</content>
 </entry>

 <entry>
   <title>CosmicSting attacks have started hitting major stores</title>
   <link href="https://sansec.io/research/cosmicsting-hitting-major-stores"/>
   <id>https://sansec.io/research/cosmicsting-hitting-major-stores</id>
   <updated>2024-07-12T00:00:00Z</updated>
   <content type="text">API AbuseAs CosmicSting enables attackers to read any file, attackers can steal Magento&#39;s secret encryption key. This encryption key can generate JSON Web Tokens with full administrative API acces...</content>
 </entry>

 <entry>
   <title>Persistent backdoors injected on Adobe Commerce via new CosmicSting attack</title>
   <link href="https://sansec.io/research/cosmicsting-cnext-persistent-backdoor"/>
   <id>https://sansec.io/research/cosmicsting-cnext-persistent-backdoor</id>
   <updated>2024-08-27T00:00:00Z</updated>
   <content type="text">CosmicSting (CVE-2024-34102) allows arbitrary file reading on unpatched systems. When combined with CNEXT (CVE-2024-2961), threat actors can escalate to remote code execution, taking over the entir...</content>
 </entry>

 <entry>
   <title>CosmicSting attack &amp; defense overview</title>
   <link href="https://sansec.io/research/cosmicsting"/>
   <id>https://sansec.io/research/cosmicsting</id>
   <updated>2024-09-16T00:00:00Z</updated>
   <content type="text">ImplicationsCosmicSting targets a critical bug in the Adobe Commerce and Magento platforms. Bad actors use it to read any of your files, such as passwords and other secrets. The typical attack str...</content>
 </entry>

 <entry>
   <title>Thousands of Adobe Commerce stores hacked in competing CosmicSting campaigns</title>
   <link href="https://sansec.io/research/cosmicsting-fallout"/>
   <id>https://sansec.io/research/cosmicsting-fallout</id>
   <updated>2024-10-01T00:00:00Z</updated>
   <content type="text">Sansec research shows that seven different groups have been hacking into 4275 online stores since the publication of CVE-2024-34102 (also known as CosmicSting) on June 11th. Despite ongoing warning...</content>
 </entry>

 <entry>
   <title>Google services abused in skimming campaigns</title>
   <link href="https://sansec.io/research/google-services-abused-skimming-campaigns"/>
   <id>https://sansec.io/research/google-services-abused-skimming-campaigns</id>
   <updated>2024-12-31T00:00:00Z</updated>
   <content type="text">Google TranslateAttackers are using Google Translate’s page functionality to execute malicious JavaScript files, as demonstrated below:&amp;lt;script src=&amp;quot;https://translate.google.co.in/translat...</content>
 </entry>

 <entry>
   <title>Sorry, client-side security does not work</title>
   <link href="https://sansec.io/research/client-side-security"/>
   <id>https://sansec.io/research/client-side-security</id>
   <updated>2025-02-03T00:00:00Z</updated>
   <content type="text">Merchants spend millions of dollars on client-side security solutions to prevent digital skimming attacks. Companies are rushing to implement these tools, often driven by PCI requirements. But here...</content>
 </entry>

 <entry>
   <title>Magento Security Release APSB25-08 [Impact Analysis]</title>
   <link href="https://sansec.io/research/magento-apsb25-08"/>
   <id>https://sansec.io/research/magento-apsb25-08</id>
   <updated>2025-02-12T00:00:00Z</updated>
   <content type="text">APSB25-08 released on Feb 11th, 2025Critical Adobe Commerce/Magento security patches have just been released (CVSS 9.4/10)New versions: 2.4.4-p12, 2.4.5-p11, 2.4.6-p9, 2.4.7-p4, additionally 2.4....</content>
 </entry>

 <entry>
   <title>Merchants left guessing at last-minute PCI-DSS u-turn</title>
   <link href="https://sansec.io/research/pci-dss-update-2025"/>
   <id>https://sansec.io/research/pci-dss-update-2025</id>
   <updated>2025-03-06T00:00:00Z</updated>
   <content type="text">It&#39;s insanity that we still don&#39;t have clarity(Clean_Anteater992)They have to be kidding me (sawer82)It&#39;s clusterf after clusterf (andrew_barratt)The Payment Card Industry Security Stan...</content>
 </entry>

 <entry>
   <title>You have 2 weeks left to set up CSP for your store</title>
   <link href="https://sansec.io/research/csp-usage-2025"/>
   <id>https://sansec.io/research/csp-usage-2025</id>
   <updated>2025-03-17T00:00:00Z</updated>
   <content type="text">The new PCI-DSS regulations that will come into effect after March 31st, 2025, require merchants to monitor scripts on their payment pages to prevent digital skimming attacks*. The use of Conte...</content>
 </entry>

 <entry>
   <title>Found defunct.dat on your site? You&#39;ve got a problem.</title>
   <link href="https://sansec.io/research/gsocket"/>
   <id>https://sansec.io/research/gsocket</id>
   <updated>2025-04-03T00:00:00Z</updated>
   <content type="text">The Sansec Shield WAF detected mass scans for &amp;quot;defunct.dat&amp;quot; and &amp;quot;qfile&amp;quot; files this week. As it turns out, these files contain connection keys that can be used to launch a GSocke...</content>
 </entry>

 <entry>
   <title>Backdoor found in popular ecommerce components</title>
   <link href="https://sansec.io/research/license-backdoor"/>
   <id>https://sansec.io/research/license-backdoor</id>
   <updated>2025-05-01T00:00:00Z</updated>
   <content type="text">Hundreds of stores, including a $40 billion multinational, are running backdoored versions of popular ecommerce software. We found that the backdoor is actively used since at least April 20th. Sans...</content>
 </entry>

 <entry>
   <title>Adobe patches critical Magento admin takeover via menu injection</title>
   <link href="https://sansec.io/research/magento-menu-bar-hack"/>
   <id>https://sansec.io/research/magento-menu-bar-hack</id>
   <updated>2025-06-12T00:00:00Z</updated>
   <content type="text">Adobe has just released several security fixes for its Commerce (Magento) platform and one of them is critical (CVE-2025-47110). Adobe urges merchants to patch within 72 hours (highest priority).S...</content>
 </entry>

 <entry>
   <title>SessionReaper, unauthenticated RCE in Magento &amp; Adobe Commerce (CVE-2025-54236)</title>
   <link href="https://sansec.io/research/sessionreaper"/>
   <id>https://sansec.io/research/sessionreaper</id>
   <updated>2025-09-08T00:00:00Z</updated>
   <content type="text">October 22nd: mass SessionReaper attacks have startedIn August 2025, a critical (CVSS 9.1) flaw was discovered in all versions of Adobe Commerce and Magento. The bug, named &amp;quot;SessionReaper&amp;q...</content>
 </entry>

 <entry>
   <title>SessionReaper attacks have started, 3 in 5 stores still vulnerable</title>
   <link href="https://sansec.io/research/sessionreaper-exploitation"/>
   <id>https://sansec.io/research/sessionreaper-exploitation</id>
   <updated>2025-10-22T00:00:00Z</updated>
   <content type="text">Six weeks after Adobe&#39;s emergency patch for SessionReaper (CVE-2025-54236), the vulnerability has entered active exploitation. Sansec Shield detected and blocked the first real-world attacks today,...</content>
 </entry>

 <entry>
   <title>Critical backdoor found in MGT Varnish extension</title>
   <link href="https://sansec.io/research/mgt-varnish-critical-vulnerability"/>
   <id>https://sansec.io/research/mgt-varnish-critical-vulnerability</id>
   <updated>2025-12-15T00:00:00Z</updated>
   <content type="text">NameMgt_VarnishVulnerable1.0.10 and earlierFixed in1.1.0Sansec researchers discovered a critical vulnerability in the popular Varnish module for Magento. This module, develope...</content>
 </entry>

 <entry>
   <title>ConnectPOS leaked Github secrets for years</title>
   <link href="https://sansec.io/research/connectpos-github-token-exposure"/>
   <id>https://sansec.io/research/connectpos-github-token-exposure</id>
   <updated>2026-01-12T00:00:00Z</updated>
   <content type="text">Sansec researchers discovered that ConnectPOS, a popular Point of Sale solution, had been exposing a GitHub Personal Access Token (PAT) in their public installation instructions for over four years...</content>
 </entry>

 <entry>
   <title>Keylogger targets 200,000+ employees at major US bank</title>
   <link href="https://sansec.io/research/keylogger-major-us-bank-employees"/>
   <id>https://sansec.io/research/keylogger-major-us-bank-employees</id>
   <updated>2026-01-15T00:00:00Z</updated>
   <content type="text">Update Jan 15th: the malware appears to have been removed. It was live for about 18 hoursSansec detected a keylogger on the employee store of one of America&#39;s largest banks. The site serves over 2...</content>
 </entry>

 <entry>
   <title>The billion-dollar security.txt problem</title>
   <link href="https://sansec.io/research/security-txt-trillion-dollar-problem"/>
   <id>https://sansec.io/research/security-txt-trillion-dollar-problem</id>
   <updated>2026-01-16T00:00:00Z</updated>
   <content type="text">Yesterday, Sansec discovered an active keylogger at an external site of one of America&#39;s largest banks. The malware was harvesting private information from over 200,000 potential victims. We detect...</content>
 </entry>

 <entry>
   <title>Claude finds 353 zero-days on Packagist</title>
   <link href="https://sansec.io/research/claude-finds-353-zero-days-packagist"/>
   <id>https://sansec.io/research/claude-finds-353-zero-days-packagist</id>
   <updated>2026-01-22T00:00:00Z</updated>
   <content type="text">Open source ecosystems have a long tail security problem. Python, Ruby, Javascript, PHP: these ecosystems have millions of packages. The top 100 packages get scrutinized. The next 5,000, not so muc...</content>
 </entry>

 <entry>
   <title>Building a faster YARA engine in pure Go</title>
   <link href="https://sansec.io/research/yargo"/>
   <id>https://sansec.io/research/yargo</id>
   <updated>2026-02-18T00:00:00Z</updated>
   <content type="text">YARA is the industry standard for pattern matching in malware detection. Maintained by VirusTotal, it powers threat detection at nearly every security vendor. At Sansec, we rely on YARA for eComsca...</content>
 </entry>

 <entry>
   <title>Digital skimmer hits global supermarket chain</title>
   <link href="https://sansec.io/research/global-retailer-prestashop-hacked"/>
   <id>https://sansec.io/research/global-retailer-prestashop-hacked</id>
   <updated>2026-02-20T00:00:00Z</updated>
   <content type="text">The affected company, with about €100 billion in annual revenue and over 10,000 stores across 25 countries, runs some of its ecommerce operations on the PrestaShop platform. As of publication, the ...</content>
 </entry>

</feed>
