Menu
Magento sites targeted by Neutrino exploit kit

Magento sites targeted by Neutrino exploit kit

It's unclear how the Magento sites have been infected

Some websites running the e-commerce platform Magento appear to have been infected with code that directs victims to the Neutrino exploit kit.

It's not exactly clear how the Magento sites were infected, wrote Denis Sinegubko, a senior malware researcher with Sucuri, a Delware-based security company.

"At this point, we can suspect that it was some vulnerability in Magento or one of the third-party extensions that allowed it to infect thousands of sites within a short time," he wrote.

The Magento sites are rigged to pull content into an iframe from a domain which has been blacklisted by Google, Sinegubko wrote.

According to Google's Safe Browsing service, the malicious domain has been responsible for infecting more than 7,800 websites.

The malicious domain has also been noticed by the security company Malwarebytes in connection with the Neutrino exploit kit, wrote Jerome Segura, a senior security researcher.

Exploit kits are planted by cyberattackers on legitimate web pages. When encountered during normal browsing, the exploit kit probes the computer for software vulnerabilities and if one is present, silently delivers malware.

The malicious domain seen by Sucuri was the one Malwarebytes had seen encountered by web-browsing clients, Segura wrote.

People who encounter the compromised websites with the iframe were bounced through a number of domains, including the malicious one spotted by Sucuri and Malwarebytes.

"The final URL loads the Neutrino exploit kit which fires a Flash exploit and drops the Andromeda/Gamarue malware," Segura wrote. "Compromised machines can be harvested for financial credentials and also become part of a large botnet."

Sinegubko wrote that websites running Magento should be sure that all core files and extensions are updated.

"Since the vulnerability provides access to your database, hackers could use it to create malicious admin users; so it is a good idea to review your site users," he wrote.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments