Menu
Magento e-commerce platform targeted with sneaky code

Magento e-commerce platform targeted with sneaky code

The attack code, inserted into Magento, neatly lifts payment card details, according to Sucuri

Attackers are injecting code into the Magento e-commerce platform to extract payment card data, according to Sucuri.

Attackers are injecting code into the Magento e-commerce platform to extract payment card data, according to Sucuri.

Attackers are using a sneaky method to steal payment card data from websites using Magento, eBay's widely used e-commerce platform.

Researchers from Sucuri, a company that specializes in securing websites, said the attackers can collect any data submitted by a user to Magento but carefully filters out anything that doesn't look like credit card data.

The attackers are injecting their malicious code into Magento, but it's still unclear how that process happens, wrote Peter Gramantik, a senior malware researcher with Sucuri.

"It seems though that the attacker is exploiting a vulnerability in Magento core or some widely used module/extension," he wrote.

All POST requests are collected, but there are rules within the attack script that only collects payment card information.

"If the structure of the POST parameters match, the attacker stores them all -- nothing more, but nothing less," Gramantik wrote. "They've got all the billing details processed by the infected site."

The stolen data is then encrypted using a public encryption key that is included in the malicious script. It is then saved in a fake image file.

If someone were to try to load the image, it wouldn't be displayed, he wrote. But the attacker can download and decrypt the fake image file, revealing the payment card details.

"Now they have all the billing information processed by the Magento e-commerce website," he wrote. "It's all nicely packed, formatted and collected."

Ebay could not be immediately reached for comment.

Sucuri also found an example of a less-sophisticated but no less effective way to steal data from Magento.

In that example, attack code is injected to Magento's Checkout Module. It collects payment card data before a transaction is processed. The data is then emailed in plain text to the attacker's account.

Those behind the method seem to be intimately familiar with how Magento works, Gramantik wrote. "The attacker knows how the module works and the code it's built on; all he needed to do was use the module's own variable in which all the sensitive data is stored unprotected."

Sucuri has seen variations of this attack before. In April, Sucuri's Denis Sinegubko outlined where hackers see opportunity within Magneto. Most websites using the platform have a checkout form where customers enter their credit card details.

Magento then encrypts that data and either saves it or sends it to a payment gateway to complete the transaction, but there is "a very short period of time when Magento handles sensitive customer information in an unencrypted format," Sinegubko wrote in a blog post.

Sinegubko wrote that's a fine method unless hackers find a way to grab the information before it's encrypted.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags SucuriMagento

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.‚Äč

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments