Breaking News

Magento Attacked Through Card Skimming Exploit

Currently of 300,000+ Magento stores, the vast majority of the installs is still running vulnerable versions of the popular content management system.

The problem with patches is that sometimes they fix something and sometimes they break something. Sounds strange, right? Well, let us explain ourselves.

See, PRODSECBUG-2198 is a security patch for Magento that fixes a number of critical holes in Magento security.

For instance, it patches a dangerous hole in the store that allows hackers to gain admin control over any Magento 2 admin account they can get their hands on. The exploit is ideal: it’s easy to replicate, requires minimal technical expertise, and offers access to credit card data.

Skimming the Cream off the E-Commerce Stores

But if it has been already patched, why are we writing about it? Well, because right now out of 300,000+ Magento stores, the vast majority is still on the versions that are vulnerable to this exploit.

Sucuri team has reverse-engineered the patch Magento developers have deployed and managed to create a working proof of concept. And if an ethical hacker team can do this, others also can and will.

Within the last few months, the amount of hacker attacks on Magento stores has increased. The criminals deconstruct critical security patches and discover zero-day vulnerabilities to mass-attack unpatched Magento stores for known vulnerabilities.

What Does the Exploit Do?

On an unpatched store, the attacker can use an SQL injection to gain access to user names and password hashes and then crack them open. With hacked admin privileges scammers can get access to customer payment data.

In less technical terms, hackers digitally skim the cards of your customers. After that, they are free to sell this data on the dark web or use it themselves.

Who Is Affected?

Everyone is affected. The proof of concept was published on GitHub as a Python script on Friday, March 29. This means it has already been available for a week. Across the web, hacking attempts on Magento stores are in full swing.

The breach is affecting all versions of Magento 1 and 2, both Magento Commerce and Open Source. Vulnerable Magento versions include:

  • 1.14.4.x (1.14.4.1 is patched),
  • 1.9.4.x (1.9.4.1 is patched),
  • 2.1.x (2.1.17 is patched),
  • 2.2.x ( 2.2.8 is patched),
  • 2.3.x (2.3.1 is patched).

What Are the Consequences?

Store owners are liable to provide adequate payment security to their visitors. This means that if a payment processor discovers that your store was the source of a customer CC data leak, your merchant account with Visa, MasterCard, Stipe, Paypal, or any other payment processor will be immediately frozen, investigated, and possibly fined for hundreds of thousands of dollars in damages.

Bear in mind that most payment processors don’t set an upper limit for the size of fines you can receive.

These payments can easily be the single crippling blow to your business. Ten leaked cards and a $5,000 fine will be dwarfed by 200 leaked cards and a $200,000+ fine (and a suspended merchant account!).

To sum it up, the main consequences are:

  • inactive merchant accounts,
  • long investigations of store transactions,
  • fines for leaked customer credit cards,
  • disruption to the business.

How to Protect Your Store?

Zero-day vulnerabilities are a gold mine to hackers exactly because Magento store owners are so slow in implementing security patches.

Because of Magento’s leading role as a B2B e-commerce giant and high level of customizations of an average store, it can be a significant challenge to install, deploy, and test new updates on Magento. But regardless of these challenges, it’s paramount that you take the security of your customers seriously.

Here’s the plan on how to safeguard your store against security breaches:

  1. Update to the latest Magento version as soon as possible. Make it a priority.
  2. Do a thorough security audit of the site to make sure you don’t already have security breaches in your store. Do a revision of all Magento users. Delete anyone you don’t recognize.
  3. If you have found any traces of a security breach, contact all involved parties (the payment processor, the customers, and company stakeholders) to sort this emergency out ASAP.

About the author Vasili Nikolaev

Technical writer @ Onilab.com
https://twitter.com/vasili_nikolaev

https://www.linkedin.com/in/vasili-nikolaev/

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – Magento, card skimming)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nova Scotia Power discloses data breach after March security incident

Nova Scotia Power confirmed a data breach involving the theft of sensitive customer data after…

3 hours ago

Coinbase disclosed a data breach after an extortion attempt

Coinbase confirmed rogue contractors stole customer data and demanded a $20M ransom in a breach…

5 hours ago

U.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Fortinet vulnerability to its Known Exploited Vulnerabilities…

14 hours ago

Kosovo authorities extradited admin of the cybercrime marketplace BlackDB.cc

Kosovar citizen extradited to the US for running the cybercrime marketplace BlackDB.cc appeared in federal…

16 hours ago

U.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows flaws to its Known Exploited…

1 day ago

Ivanti fixed two EPMM flaws exploited in limited attacks

Ivanti addressed two Endpoint Manager Mobile (EPMM) software vulnerabilities that have been exploited in limited…

1 day ago