Post

Sansec Uncovers Massive Supply Chain Attack: 21 Compromised Magento Extensions Hit 500-1000 E-Stores

Sansec Uncovers Massive Supply Chain Attack: 21 Compromised Magento Extensions Hit 500-1000 E-Stores

TL;DR

Sansec has revealed a significant supply chain attack involving 21 compromised Magento extensions, affecting between 500 and 1,000 e-stores. The attack, discovered by Alexandra Zota, has been ongoing for six years but was only recently detected. The compromised extensions allowed attackers to control e-stores by exploiting backdoors in popular e-commerce software.

Supply Chain Attack via 21 Backdoored Magento Extensions Impacts 500-1000 E-Stores

Security researchers at Sansec have uncovered a coordinated supply chain attack targeting multiple vendors, with 21 Magento extensions found to contain hidden backdoors. Surprisingly, the malicious code was injected six years ago, but the attack was only discovered this week after the threat actors compromised e-commerce servers. The researchers estimate that between 500 and 1,000 e-stores, including a $40 billion multinational corporation, have been affected by these backdoored extensions.

Discovery and Impact

The attack was initially discovered by Alexandra Zota. Sansec’s investigation revealed that threat actors breached the download servers of Tigren, Magesolution (MGS), and Meetanshi, injecting backdoors into their software. This allowed the attackers to take control of their customers’ e-stores.

“Hundreds of stores, including a $40 billion multinational, are running backdoored versions of popular e-commerce software. We found that the backdoor is actively used since at least April 20th. Sansec identified these backdoors in the following packages which were published between 2019 and 2022.” 1

Compromised Extensions

The backdoored extensions, published between 2019 and 2022, include:

Vendor Package
Tigren Ajaxsuite
Tigren Ajaxcart
Tigren Ajaxlogin
Tigren Ajaxcompare
Tigren Ajaxwishlist
Tigren MultiCOD
Meetanshi ImageClean
Meetanshi CookieNotice
Meetanshi Flatshipping
Meetanshi FacebookChat
Meetanshi CurrencySwitcher
Meetanshi DeferJS
MGS Lookbook
MGS StoreLocator
MGS Brand
MGS GDPR
MGS Portfolio
MGS Popup
MGS DeliveryTime
MGS ProductTabs
MGS Blog

Technical Details

The analysis of the malicious extensions revealed that the backdoor involves a fake license check in a file called License.php or LicenseApi.php, allowing attackers to control the $licenseFile variable. In older versions (2019), this required no authentication, but newer versions require a secret key.

“The evil is in the adminLoadLicense function, which executes $licenseFile as PHP.” The $licenseFile can be controlled by the attacker using the adminUploadLicense function. In versions from 2019 this does not require any authentication.” 1

The fake license check was activated via registration.php, and each vendor’s backdoor had a unique checksum, path, and filename.

Backdoor Activation

Vendor Responses

Sansec contacted the impacted vendors and received varying responses:

  • Tigren: Denies being hacked, but their packages are still online.
  • Meetanshi: Claims no tampering but confirms their server was hacked.
  • Magesolution (MGS): Did not respond, but backdoored packages are still available.

“It is rare that a backdoor remains undetected for 6 years, but it is even stranger that actual abuse has only started now.” 1

Follow-Up and Resources

For more details, visit the full article: source

Follow me on:

For further insights, check:

This post is licensed under CC BY 4.0 by the author.