Share:
POST
TWEET
SHARE
SHARE
EMAIL

Magento Shops malware risk identified

By Dan Wilson January 4, 2018 - 11:46 pm

According to security and Magento blogger Willem de Groot, a Magento shops plug-in was vulnerable to malware attacks that harvested payment details.

The Mirasvit Helpdesk MX plugin could be infected with malware. But the error was resolved in September, so unless you’re running an old version of the plug-in, you should be fine.

De Groot described the problem in full on his blog here and said: “When a helpdesk agent opens the ticket, it will run the code in the background, in the browser of the agent. Then, malware is added to the footer of the Magento template, so that it is run by all store visitors. Ultimately, the malware intercepts payments data and send it offshore as the customer types it into the payment form.

This attack is particularly sophisticated, as it is able to bypass many security measures that a merchant might have taken. For example, IP restriction on the backend, strong passwords, 2-Factor-Authentication and using a VPN tunnel will not block this attack.”

It’s impossible to know how widespread this particular malware problem was for Magento shops users although it’s good to report it has been resolved. However, if you’re using a version of the plug in older than 1.5.3 you are best advised to update immediately. You can read a security advisory from Mirasvit here.

If you have any more insights, or experienced this hack, we’d be interested to hear from you.

Comments are closed.

Recent Comments

2 hours ago
David Brackin: I've just checked two of our items which have catalogue pages from using the EAN....
2 hours ago
NorthCrystal: What about buyers opening return case and then returning then item with huge delay (usually...
2 hours ago
NorthCrystal: So here goes the 1000 eBay "millionaires" into the sea. Most of them do tiny...
3 hours ago
LEE PEARCE: Worst case scenario is that you have to stick customs label on your outgoing...