Menu
Magento sites targeted by Neutrino exploit kit

Magento sites targeted by Neutrino exploit kit

It's unclear how the Magento sites have been infected

Some websites running the e-commerce platform Magento appear to have been infected with code that directs victims to the Neutrino exploit kit.

It's not exactly clear how the Magento sites were infected, wrote Denis Sinegubko, a senior malware researcher with Sucuri, a Delware-based security company.

"At this point, we can suspect that it was some vulnerability in Magento or one of the third-party extensions that allowed it to infect thousands of sites within a short time," he wrote.

The Magento sites are rigged to pull content into an iframe from a domain which has been blacklisted by Google, Sinegubko wrote.

According to Google's Safe Browsing service, the malicious domain has been responsible for infecting more than 7,800 websites.

The malicious domain has also been noticed by the security company Malwarebytes in connection with the Neutrino exploit kit, wrote Jerome Segura, a senior security researcher.

Exploit kits are planted by cyberattackers on legitimate web pages. When encountered during normal browsing, the exploit kit probes the computer for software vulnerabilities and if one is present, silently delivers malware.

The malicious domain seen by Sucuri was the one Malwarebytes had seen encountered by web-browsing clients, Segura wrote.

People who encounter the compromised websites with the iframe were bounced through a number of domains, including the malicious one spotted by Sucuri and Malwarebytes.

"The final URL loads the Neutrino exploit kit which fires a Flash exploit and drops the Andromeda/Gamarue malware," Segura wrote. "Compromised machines can be harvested for financial credentials and also become part of a large botnet."

Sinegubko wrote that websites running Magento should be sure that all core files and extensions are updated.

"Since the vulnerability provides access to your database, hackers could use it to create malicious admin users; so it is a good idea to review your site users," he wrote.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Slideshows

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

Ingram Micro completed its nationwide roadshow in Auckland last month, kicking off its Innovation Hour series with Hewlett Packard Enterprise. Uncovering the latest in storage, networking and servers, the event outlined key market trends for resellers in 2016 and beyond.

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise
IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

FireEye welcomed 143 channel partners and distributors to FireEye's 2016 annual Partner Conference, FireEye A/NZ Momentum - held at Establishment in Sydney. Delegates heard from senior trans-Tasman channel leaders, marketing and the product divisions in the morning, with FireEye customers, incident responders and threat intelligence analysts sharing knowledge during the afternoon.

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference
​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

With New Zealand businesses now open to innovation, the industry sits on the cusp of significant disruption in the data centre. Driven by software-defined networking, the future of the data centre is fast becoming reality, as the channel seeks to keep up, keep innovating and keep growing. APC by Schneider Electric, Lenovo and key partners outlined how the channel can capitalise at The Grill restaurant in Auckland.

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​
Show Comments