The problem with patches is that sometimes they fix something and sometimes they break something. Sounds strange, right? Well, let us explain ourselves.
See, PRODSECBUG-2198 is a security patch for Magento that fixes a number of critical holes in Magento security.
For instance, it patches a dangerous hole in the store that allows hackers to gain admin control over any Magento 2 admin account they can get their hands on. The exploit is ideal: it’s easy to replicate, requires minimal technical expertise, and offers access to credit card data.
But if it has been already patched, why are we writing about it? Well, because right now out of 300,000+ Magento stores, the vast majority is still on the versions that are vulnerable to this exploit.
Sucuri team has reverse-engineered the patch Magento developers have deployed and managed to create a working proof of concept. And if an ethical hacker team can do this, others also can and will.
Within the last few months, the amount of hacker attacks on Magento stores has increased. The criminals deconstruct critical security patches and discover zero-day vulnerabilities to mass-attack unpatched Magento stores for known vulnerabilities.
On an unpatched store, the attacker can use an SQL injection to gain access to user names and password hashes and then crack them open. With hacked admin privileges scammers can get access to customer payment data.
In less technical terms, hackers digitally skim the cards of your customers. After that, they are free to sell this data on the dark web or use it themselves.
Everyone is affected. The proof of concept was published on GitHub as a Python script on Friday, March 29. This means it has already been available for a week. Across the web, hacking attempts on Magento stores are in full swing.
The breach is affecting all versions of Magento 1 and 2, both Magento Commerce and Open Source. Vulnerable Magento versions include:
Store owners are liable to provide adequate payment security to their visitors. This means that if a payment processor discovers that your store was the source of a customer CC data leak, your merchant account with Visa, MasterCard, Stipe, Paypal, or any other payment processor will be immediately frozen, investigated, and possibly fined for hundreds of thousands of dollars in damages.
Bear in mind that most payment processors don’t set an upper limit for the size of fines you can receive.
These payments can easily be the single crippling blow to your business. Ten leaked cards and a $5,000 fine will be dwarfed by 200 leaked cards and a $200,000+ fine (and a suspended merchant account!).
To sum it up, the main consequences are:
Zero-day vulnerabilities are a gold mine to hackers exactly because Magento store owners are so slow in implementing security patches.
Because of Magento’s leading role as a B2B e-commerce giant and high level of customizations of an average store, it can be a significant challenge to install, deploy, and test new updates on Magento. But regardless of these challenges, it’s paramount that you take the security of your customers seriously.
Here’s the plan on how to safeguard your store against security breaches:
About the author Vasili Nikolaev
Technical writer @ Onilab.com
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.