Magento e-commerce platform targeted with sneaky code

The attack code, inserted into Magento, neatly lifts payment card details, according to Sucuri

Attackers are injecting code into the Magento e-commerce platform to extract payment card data, according to Sucuri.

Attackers are injecting code into the Magento e-commerce platform to extract payment card data, according to Sucuri.

Attackers are using a sneaky method to steal payment card data from websites using Magento, eBay's widely used e-commerce platform.

Researchers from Sucuri, a company that specializes in securing websites, said the attackers can collect any data submitted by a user to Magento but carefully filters out anything that doesn't look like credit card data.

The attackers are injecting their malicious code into Magento, but it's still unclear how that process happens, wrote Peter Gramantik, a senior malware researcher with Sucuri.

"It seems though that the attacker is exploiting a vulnerability in Magento core or some widely used module/extension," he wrote.

All POST requests are collected, but there are rules within the attack script that only collects payment card information.

"If the structure of the POST parameters match, the attacker stores them all -- nothing more, but nothing less," Gramantik wrote. "They've got all the billing details processed by the infected site."

The stolen data is then encrypted using a public encryption key that is included in the malicious script. It is then saved in a fake image file.

If someone were to try to load the image, it wouldn't be displayed, he wrote. But the attacker can download and decrypt the fake image file, revealing the payment card details.

"Now they have all the billing information processed by the Magento e-commerce website," he wrote. "It's all nicely packed, formatted and collected."

Ebay could not be immediately reached for comment.

Sucuri also found an example of a less-sophisticated but no less effective way to steal data from Magento.

In that example, attack code is injected to Magento's Checkout Module. It collects payment card data before a transaction is processed. The data is then emailed in plain text to the attacker's account.

Those behind the method seem to be intimately familiar with how Magento works, Gramantik wrote. "The attacker knows how the module works and the code it's built on; all he needed to do was use the module's own variable in which all the sensitive data is stored unprotected."

Sucuri has seen variations of this attack before. In April, Sucuri's Denis Sinegubko outlined where hackers see opportunity within Magneto. Most websites using the platform have a checkout form where customers enter their credit card details.

Magento then encrypts that data and either saves it or sends it to a payment gateway to complete the transaction, but there is "a very short period of time when Magento handles sensitive customer information in an unencrypted format," Sinegubko wrote in a blog post.

Sinegubko wrote that's a fine method unless hackers find a way to grab the information before it's encrypted.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags Magentosecuritydata breachSucuri

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?