Magento Shops malware risk identified

By Dan Wilson January 4, 2018 - 11:46 pm

According to security and Magento blogger Willem de Groot, a Magento shops plug-in was vulnerable to malware attacks that harvested payment details.

The Mirasvit Helpdesk MX plugin could be infected with malware. But the error was resolved in September, so unless you’re running an old version of the plug-in, you should be fine.

De Groot described the problem in full on his blog here and said: “When a helpdesk agent opens the ticket, it will run the code in the background, in the browser of the agent. Then, malware is added to the footer of the Magento template, so that it is run by all store visitors. Ultimately, the malware intercepts payments data and send it offshore as the customer types it into the payment form.

This attack is particularly sophisticated, as it is able to bypass many security measures that a merchant might have taken. For example, IP restriction on the backend, strong passwords, 2-Factor-Authentication and using a VPN tunnel will not block this attack.”

It’s impossible to know how widespread this particular malware problem was for Magento shops users although it’s good to report it has been resolved. However, if you’re using a version of the plug in older than 1.5.3 you are best advised to update immediately. You can read a security advisory from Mirasvit here.

If you have any more insights, or experienced this hack, we’d be interested to hear from you.

Comments are closed.

Recent Comments

23 mins ago
tyler: @Andy R Looks like a lot of negative comments about them, I would think twice about...
1 hour ago
northumbrian: here we go with the troll bollocks squark and whinge troll as soon...
19 hours ago
Tracey Edwards: I have just withdrawn my service to Hermes after 13 years. Fed up with failing...
20 hours ago
tyler: Yes I think that sums you up... Did you have anything worth contributing to this topic...