Magento Communicates with Users About Brute Force Attacks

Last week we published a story that Cybersecurity researchers at Flashpoint found about a thousand compromised Magento Admin panels which allowed hackers to take over the sites and use them for cryptocurrency mining and stealing credit card data.

Flashpoint also stated they assumed this brute-force attack might have impacted more Magento users as well as users from other platforms.

Magento reached out to us and communicated the following:

Up to 1,000 open-source accounts were affected by brute force attacks, a form of fraud where cybercriminals take advantage of weak passwords to steal information and distribute malware.

This is not a new threat, as there have been previously reported variants that have impacted other vendor systems. All accounts identified were on Magento Open Source (formerly Community Edition), and we have communicated to users how to take immediate action and employ preventive measures.

We continue to be fully committed to ensuring the security of our merchants and their customers, encouraging all of our merchants to stay up-to-date on security patches and recommended security best practices, found at www.magento.com/security/best-practices, as well as perform malware tests on sites with the Magento Security Scan Tool accessed in their Magento account.

We strongly recommend that all Magento Open Source or Community Edition users go to www.magento.com/security/best-practices and follow Magento’s recommendations.

And it is good to see that Magento reacted to the story evenso it included Open Source software so that users could be take appropriate precautions.

As the company also stated, this is not a particularly new threat with cybercriminals trying to gain access via brute-force attacks.

But we believe the fact that Flashpoint found compromised Magento Admin credentials on the Dark Web should remind everyone that hackers will always look for ways into systems.

And they will typically find greater success in those installations that are not up-to-date with security patches or use lax password policies.

We’d love your thoughts on this story. Head over to our Facebook Discussion Group or use the comments section below.

1 COMMENT

  1. Platforms such as WordPress, Joomla and now Magneto have been constant targets for hackers around the globe because it’s software driven. In most cases admins have to worry about keeping the network safe but when you add software based web development you end up with some potential holes in the network. On top of keeping your systems up to date now you have to worry about your website being up to date as well. HTML websites are easier to defend if your network is secure, but harder to edit, especially if you have a blog. Thanks for the article

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.