Hackers Exploit Bug in Magento to Access Payment Data on eCommerce Sites

April 10, 2024 10:05:00

A critical flaw in the open-source e-commerce platform Magento has allowed hackers to make backdoors into e-commerce websites and steal payment data. Computer software company Adobe Inc. describes the error, CVE-2024-2072, as the “improper neutralization of special elements” that could allow attackers to make arbitrary code executions without any user interaction.

Adobe addressed the vulnerability on Feb. 13, 2024, as part of a batch of security updates while e-commerce security company Sansec announced that it had found a database layout template that was used to “inject malicious code” automatically. Hackers could then use this code to execute commands arbitrarily by combining the “cleverly crafted layout” with the beberlei/assert package.

According to Sansec, this vulnerability could be exploited any time a user requested <store>/checkout/cart as checkout cart is tied to the layout block, allowing them to execute system commands. More specifically, hackers could execute the command “sed,” enabling them to insert a code execution backdoor that would then deliver a Stripe payment skimmer to capture and retrieve financial information to another infiltrated Magento store.

News of the Magento vulnerability comes after Moscow charged six individuals for using similar skimmer malware to steal payment and credit card information from foreign virtual stores for at least six years. Reports citing court documents show that Alexander Aseyev, Denis Priymachenko, Alexander Basov, Vladislav Patyuk, Anton Tolmachev and Dmitry Kolpakov were arrested as suspects last year.

In a rare move, the prosecutor general’s office of the Russian Federation publicly noted that the hacker group focused on foreign e-commerce platforms and stole the information of close to 160,000 payment cards before selling them via shadow internet sites. SANS Institute instructor Will Thomas said the hacker group used Magecart, a tactic for stealing information that was initially used by the group behind the initial Magento attacks.

This Magecart-like tactic saw the hackers inject malicious code into web pages where customers typically enter payment information, including checkout pages to capture CVV codes, credit card data and other sensitive private information. The hacker group would then store this data on its servers before using darknet forums to sell the information to operations that perpetuate credit card debt.

With dozens of groups carrying out similar hacking operations across the globe, Thomas noted that attributing fault to one group can be quite difficult. Recorded Future’s Insikt Group estimates that in 2022 alone, such groups gathered close to 60 million credit-card payment records and posted them on dark web forums.

Entities in sensitive segments of e-commerce such as healthcare e-commerce, including NextPlat Corp. (NASDAQ: NXPL) (NASDAQ: NXPLW), are probably concerned about how other hacks of this nature can be prevented in the future since it would be damaging if the sensitive personal information of patients buying their medications and supplies from online stores is compromised by hackers.

NOTE TO INVESTORS: The latest news and updates relating to NextPlat Corp. (NASDAQ: NXPL, NXPLW) are available in the company’s newsroom at https://ibn.fm/NXPL

About BioMedWire

BioMedWire (“BMW”) is a specialized communications platform with a focus on the latest developments in the Biotechnology (BioTech), Biomedical Sciences (BioMed) and Life Sciences sectors. It is one of 60+ brands within the Dynamic Brand Portfolio @ IBN that delivers: (1) access to a vast network of wire solutions via InvestorWire to efficiently and effectively reach a myriad of target markets, demographics and diverse industries; (2) article and editorial syndication to 5,000+ outlets; (3) enhanced press release enhancement to ensure maximum impact; (4) social media distribution via IBN to millions of social media followers; and (5) a full array of tailored corporate communications solutions. With broad reach and a seasoned team of contributing journalists and writers, BMW is uniquely positioned to best serve private and public companies that want to reach a wide audience of investors, influencers, consumers, journalists and the general public. By cutting through the overload of information in today’s market, BMW brings its clients unparalleled recognition and brand awareness.

BMW is where breaking news, insightful content and actionable information converge.

To receive SMS alerts from BioMedWire, “Biotech” to 888-902-4192 (U.S. Mobile Phones Only)

For more information, please visit https://www.BioMedWire.com

Please see full terms of use and disclaimers on the BioMedWire website applicable to all content provided by BMW, wherever published or re-published: https://www.BioMedWire.com/Disclaimer

BioMedWire
San Francisco, CA
www.BioMedWire.com
415.949.5050 Office
[email protected]

BioMedWire is powered by IBN