Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/3/2018
06:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Criminals Targeting Magento Sites with Brute-Force Password Attacks

Flashpoint says it is aware of at least 1,000 sites using Magento's e-commerce platform that have been recently compromised.

Cybercriminals are using brute-force password attacks to gain administrative access to sites using Magento's open source e-commerce platform in order to steal credit card numbers and distribute cryptocurrency mining malware, Flashpoint warned this week.

In a report Monday, the security vendor said it is aware of at least 1,000 Magento sites that appear to have been recently compromised by attackers using common and default credentials to brute force their way into the content management system (CMS) admin panel. In many cases, their task appears to have been simplified by admins who had failed to change default credentials to the platform, Flashpoint said. According to the vendor, it is quite likely the 1,000 compromised panels that it is aware of are only a subset of a larger body of compromised Magento websites.

The attackers have been using their admin access to inject malicious code into the Magento system for accessing pages and for intercepting requests to the server involving payment card data. In many cases, they have also carried out other opportunistic attacks.

Vitali Kremez, director of research for Flashpoint, says the company obtained 1,000 compromised Magento CMS panels from a Russian-speaking criminal. The threat actor was able to procure access to the panels through brute-force attacks, he says. "The actor targeted several different sectors, including education and healthcare," Kremez notes. "The IP addresses associated with the compromised panels map predominantly to Europe and the United States."

He describes the types of compromised websites as ranging from small to midsize organizations that had installed the Magento CMS for e-commerce transactions. Online retail stores appear to have been the mostly heavily affected, followed by healthcare and education websites, Kremez says.

"The actors exploit and monetize their Magento panel accesses in three unique ways depending on [the] sites," he says.

The favored way is to install JavaScript sniffers on the compromised site for scraping payment card data, which is then later sold on Dark Web stores. If the breached website does not yield payment card data, the attackers resort to uploading cryptocurrency mining tools such as Coinhive.

The third tactic is to use the compromised site to host code — typically a phony Adobe Flash Player update — which, if executed, results in a data-stealing malware tool dubbed AZORult being downloaded on computers belonging to site visitors. AZORult in turn downloads Rarog, a Coinhive cryptocurrency miner on the user's system.

The attackers have shown a tendency to update the malicious files daily in order to avoid detection by signature-based anti-malware tools, according to Flashpoint.

The discovery of the 1,000 compromised Magento websites highlights the continuing attacker interest in the platform.

"Magento CMS panels are, by far, one of the most popular e-commerce panels developed for online transactions that are heavily targeted by cybercriminals," Kremez says. Other common CMS platforms that are favored by cybercriminals, but to a lesser extent, include Powerfront and OpenCart CMS, he notes.

The recent rash of attacks is another reminder of the security risks posed by the use of default credentials by administrators. The attacks highlight the need for administrators to review the credentials that are being used to access the Magento CMS and to ensure and enforce password complexity requirements. Organizations should enable two-factor authentication for access to sensitive systems, databases, and applications, the security vendor said.

Related Content:

 

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15058
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
CVE-2020-15059
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
CVE-2020-15060
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.
CVE-2020-15061
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to denial-of-service the device via long input values.
CVE-2020-15062
PUBLISHED: 2020-08-07
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.