BreachesHIGH

Magento Breach - Ongoing Defacement Campaign Hits Thousands

SWSecurityWeek·Reporting by Ionut Arghire
📰 2 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, many online stores using Magento were hacked and had their websites changed by attackers.

Quick Summary

A significant defacement campaign has hit over 7,500 Magento sites, affecting global brands and government services. This widespread attack underscores serious security vulnerabilities. Immediate updates and security measures are crucial to prevent further exploitation.

What Happened

On February 27, a mass defacement campaign targeting Magento sites began, affecting over 7,500 websites. The attacks involved deploying plaintext defacement files across more than 15,000 hostnames. These files often contained the handles of the attackers, with some featuring political messages related to recent geopolitical events. However, these messages appeared for only a short time, suggesting they were not the main goal of the campaign.

According to Netcraft, a digital risk protection platform, the attackers are likely exploiting an unauthenticated file upload vulnerability in Magento. This vulnerability affects various versions of Magento, including Open Source and Adobe Commerce. The campaign has drawn parallels to earlier attacks in October 2025, which exploited the SessionReaper flaw.

Who's Affected

The defacement campaign has impacted a wide range of entities, including global brands like Asus, FedEx, and Toyota. Many of these brands were targeted through their subdomains and regional storefronts. Additionally, several government services and educational institutions in Latin America and Qatar were also affected. Notably, some domains associated with the Trump Organization were part of the defacement.

The broad scope of this campaign raises alarms about the security of e-commerce platforms and highlights the vulnerability of even well-known brands. The fact that both commercial and governmental sites were affected indicates a serious threat landscape.

What Data Was Exposed

While the primary focus of the attackers appears to be defacement rather than data theft, the implications are still significant. The defacement files often included the attackers' handles, which they used to build a reputation within the hacking community. However, the PolyShell vulnerability reported by Sansec could allow attackers to upload executables to any Magento store without authentication, potentially leading to more severe data breaches in the future.

The vulnerability affects all versions of Magento Open Source and Adobe Commerce up to 2.4.9-alpha2, raising concerns about the security of many sites still operating on these versions. The risk of XSS attacks in earlier versions adds another layer of vulnerability.

What You Should Do

To protect against such attacks, site administrators should immediately assess their Magento installations for vulnerabilities. Here are some recommended actions:

  • Update Magento: Ensure that your site is running the latest version of Magento to mitigate known vulnerabilities.
  • Monitor for Defacement: Regularly check your site for unauthorized changes or defacement.
  • Implement Security Measures: Employ security plugins and firewalls to protect against unauthorized access.
  • Educate Your Team: Make sure that everyone involved in managing the site understands the importance of security and how to identify potential threats.

By taking these steps, businesses can better safeguard their online presence and reduce the risk of falling victim to similar campaigns in the future.

🔒 Pro insight: Analysis pending for this article.

Original article from

SWSecurityWeek· Ionut Arghire
Read Full Article

Also covered by

SESecurity Affairs

7,500+ Magento sites defaced in global hacking campaign

Read Article
CYCyber Security News

Hackers Compromised 7,500+ Magento Websites to Upload Hidden Malicious Files and Steal Data

Read Article

Related Pings

HIGHBreaches

Syria’s Security Failures Exposed by Government Account Hack

A recent hack exposed Syrian government accounts, revealing significant cybersecurity weaknesses. This incident raises concerns about the state’s digital security practices and its ability to communicate effectively. Experts warn that without urgent reforms, Syria's digital infrastructure remains at risk.

Wired Security·
LOWBreaches

T-Mobile - Clarifies Details on Recent Data Breach Incident

T-Mobile recently clarified a data breach involving an insider incident, impacting just one customer. Personal financial data remained secure, and the company has taken necessary precautions.

SecurityWeek·
HIGHBreaches

CBP Facility Codes Exposed in Quizlet Flashcards Leak

A Quizlet flashcard set has leaked sensitive information about US Customs and Border Protection facilities, raising serious security concerns.

Wired Security·
HIGHBreaches

Iran Handala Group Breaches Israeli Defence Contractor PSK Wind

Iranian hackers have breached PSK Wind Technologies, an Israeli defense contractor. Sensitive military data has been stolen, posing serious risks to national security. Organizations must strengthen their defenses against such cyber threats.

Security Affairs·
HIGHBreaches

Adobe Breach - Threat Actor Claims Leak of 13 Million Records

A hacker claims to have breached Adobe, leaking sensitive data including 13 million support tickets and employee records. This incident highlights serious third-party security risks.

Cyber Security News·
HIGHBreaches

Americans' Passports Stolen - Hacktivist Attack on Dubai Airport

A hacktivist group has reportedly stolen American passports from Dubai Airport. This breach raises serious concerns about identity theft and fraud risks. Travelers should monitor their information closely.

SC Media·