Attacks/Breaches

4/3/2018
06:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Criminals Targeting Magento Sites with Brute-Force Password Attacks

Flashpoint says it is aware of at least 1,000 sites using Magento's e-commerce platform that have been recently compromised.

Cybercriminals are using brute-force password attacks to gain administrative access to sites using Magento's open source e-commerce platform in order to steal credit card numbers and distribute cryptocurrency mining malware, Flashpoint warned this week.

In a report Monday, the security vendor said it is aware of at least 1,000 Magento sites that appear to have been recently compromised by attackers using common and default credentials to brute force their way into the content management system (CMS) admin panel. In many cases, their task appears to have been simplified by admins who had failed to change default credentials to the platform, Flashpoint said. According to the vendor, it is quite likely the 1,000 compromised panels that it is aware of are only a subset of a larger body of compromised Magento websites.

The attackers have been using their admin access to inject malicious code into the Magento system for accessing pages and for intercepting requests to the server involving payment card data. In many cases, they have also carried out other opportunistic attacks.

Vitali Kremez, director of research for Flashpoint, says the company obtained 1,000 compromised Magento CMS panels from a Russian-speaking criminal. The threat actor was able to procure access to the panels through brute-force attacks, he says. "The actor targeted several different sectors, including education and healthcare," Kremez notes. "The IP addresses associated with the compromised panels map predominantly to Europe and the United States."

He describes the types of compromised websites as ranging from small to midsize organizations that had installed the Magento CMS for e-commerce transactions. Online retail stores appear to have been the mostly heavily affected, followed by healthcare and education websites, Kremez says.

"The actors exploit and monetize their Magento panel accesses in three unique ways depending on [the] sites," he says.

The favored way is to install JavaScript sniffers on the compromised site for scraping payment card data, which is then later sold on Dark Web stores. If the breached website does not yield payment card data, the attackers resort to uploading cryptocurrency mining tools such as Coinhive.

The third tactic is to use the compromised site to host code — typically a phony Adobe Flash Player update — which, if executed, results in a data-stealing malware tool dubbed AZORult being downloaded on computers belonging to site visitors. AZORult in turn downloads Rarog, a Coinhive cryptocurrency miner on the user's system.

The attackers have shown a tendency to update the malicious files daily in order to avoid detection by signature-based anti-malware tools, according to Flashpoint.

The discovery of the 1,000 compromised Magento websites highlights the continuing attacker interest in the platform.

"Magento CMS panels are, by far, one of the most popular e-commerce panels developed for online transactions that are heavily targeted by cybercriminals," Kremez says. Other common CMS platforms that are favored by cybercriminals, but to a lesser extent, include Powerfront and OpenCart CMS, he notes.

The recent rash of attacks is another reminder of the security risks posed by the use of default credentials by administrators. The attacks highlight the need for administrators to review the credentials that are being used to access the Magento CMS and to ensure and enforce password complexity requirements. Organizations should enable two-factor authentication for access to sensitive systems, databases, and applications, the security vendor said.

Related Content:

 

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14084
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for MKCB, an Ethereum token. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell().
CVE-2018-14085
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function swe...
CVE-2018-14086
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for SingaporeCoinOrigin (SCO), an Ethereum token. The contract has an integer overflow. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell(...
CVE-2018-14087
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for EUC (EUC), an Ethereum token. The contract has an integer overflow. If the owner sets the value of buyPrice to a large number in setPrices() then the "msg.value * buyPrice" will cause an integer overflow in the fallback functio...
CVE-2018-14088
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for STeX White List (STE(WL)), an Ethereum token. The contract has an integer overflow. If the owner sets the value of amount to a large number then the "amount * 1000000000000000" will cause an integer overflow in withdrawToFounde...