Menu
Magento sites targeted by Neutrino exploit kit

Magento sites targeted by Neutrino exploit kit

It's unclear how the Magento sites have been infected

Some websites running the e-commerce platform Magento appear to have been infected with code that directs victims to the Neutrino exploit kit.

It's not exactly clear how the Magento sites were infected, wrote Denis Sinegubko, a senior malware researcher with Sucuri, a Delware-based security company.

"At this point, we can suspect that it was some vulnerability in Magento or one of the third-party extensions that allowed it to infect thousands of sites within a short time," he wrote.

The Magento sites are rigged to pull content into an iframe from a domain which has been blacklisted by Google, Sinegubko wrote.

According to Google's Safe Browsing service, the malicious domain has been responsible for infecting more than 7,800 websites.

The malicious domain has also been noticed by the security company Malwarebytes in connection with the Neutrino exploit kit, wrote Jerome Segura, a senior security researcher.

Exploit kits are planted by cyberattackers on legitimate web pages. When encountered during normal browsing, the exploit kit probes the computer for software vulnerabilities and if one is present, silently delivers malware.

The malicious domain seen by Sucuri was the one Malwarebytes had seen encountered by web-browsing clients, Segura wrote.

People who encounter the compromised websites with the iframe were bounced through a number of domains, including the malicious one spotted by Sucuri and Malwarebytes.

"The final URL loads the Neutrino exploit kit which fires a Flash exploit and drops the Andromeda/Gamarue malware," Segura wrote. "Compromised machines can be harvested for financial credentials and also become part of a large botnet."

Sinegubko wrote that websites running Magento should be sure that all core files and extensions are updated.

"Since the vulnerability provides access to your database, hackers could use it to create malicious admin users; so it is a good idea to review your site users," he wrote.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments