Hackers are taking over online stores and stealing customers' payment card data by exploiting a three-year-old vulnerability in a Magento plugin according to the FBI.
This kind of attack is known as web skimming or Magecart and in October of last year, the FBI issued a similar warning about an increase in these types of attacks.
As reported by ZDNet (opens in new tab), attackers are exploiting a vulnerability, tracked as CVE-2019-7391, in the MAGMI (Magento Mass Import) plugin for Magento-based online stores in this latest campaign. The vulnerability is a cross-site scripting (XSS) bug that allows an attacker to plan malicious code inside of an online store's HTML code.
- This devious Android ransomware pretends to be the FBI
- Magento ecommerce sites at 'high risk' of cyberattack
- Magecart hackers target popular poker software
According to the FBI, the hackers are exploiting this vulnerability in order to steal environment credentials from online stores running Magento which they then use to take full control over targeted sites.
MAGMI plugin vulnerability
The malicious server used by the hackers behind this latest campaign is used by the cybercrime service Inter which rents out infrastructure to low-skilled hacking groups so that they can launch web skimming operations.
Updating the MAGMI plugin to version 0.7.23 is highly recommended for online stores using the plugin as this fixes the XSS bug that hackers use to gain entry to the stores in the first place. Unfortunately though, the plugin only works for older versions of Magento stores running the 1.x branch that is set to reach end-of-life this June.
The FBI's flash alert (opens in new tab) also contains indicators of compromise (IOCs) that Magento users can deploy inside their web application firewalls to prevent attacks against their sties.
- We've also highlighted the best antivirus software
Via ZDNet (opens in new tab)