Magento Shops malware risk identified

By Dan Wilson January 4, 2018 - 11:46 pm

According to security and Magento blogger Willem de Groot, a Magento shops plug-in was vulnerable to malware attacks that harvested payment details.

The Mirasvit Helpdesk MX plugin could be infected with malware. But the error was resolved in September, so unless you’re running an old version of the plug-in, you should be fine.

De Groot described the problem in full on his blog here and said: “When a helpdesk agent opens the ticket, it will run the code in the background, in the browser of the agent. Then, malware is added to the footer of the Magento template, so that it is run by all store visitors. Ultimately, the malware intercepts payments data and send it offshore as the customer types it into the payment form.

This attack is particularly sophisticated, as it is able to bypass many security measures that a merchant might have taken. For example, IP restriction on the backend, strong passwords, 2-Factor-Authentication and using a VPN tunnel will not block this attack.”

It’s impossible to know how widespread this particular malware problem was for Magento shops users although it’s good to report it has been resolved. However, if you’re using a version of the plug in older than 1.5.3 you are best advised to update immediately. You can read a security advisory from Mirasvit here.

If you have any more insights, or experienced this hack, we’d be interested to hear from you.

Comments are closed.

Recent Comments

22 mins ago
alan paterson: with proper tracking information - regardless of the courier we have NEVER not been covered...
44 mins ago
tyler: @northumbrian I have had eBay & PayPal both rule in our favour when using Royal...
1 hour ago
northumbrian: since when has ebay covered a seller for anything to be fair on parcel2go...
2 hours ago
Mark: Using P2G unfortunately the tracking code supplied by them for ebay is not accepted and...