Attackers are still trying to find Magento installations that haven't patched a particularly bad vulnerability, this time trying to trick people into downloading a fake patch.
The bogus patch purports to fix a flaw known as the Shoplift Bug, or SUPEE-5344, wrote Denis Sinegubko, a senior malware researcher with Sucuri.
"While the patch was released February 2015, many sites unfortunately did not update," he wrote. "This gave hackers an opportunity to compromise thousands of Magento powered online stores."
Magento, which eBay sold to investment fund Permira in November, is one of the most popular e-commerce and content management platforms. It's used by companies including Nike, Olympus and Ghirardelli Chocolate.
The Shoplift Bug is a remote code execution vulnerability. If exploited, it can give attackers administrative access to an e-commerce store. At that point, a range of bad outcomes are possible.
"Regardless of technique employed, the results were the same; customer credit card information was being stolen and siphoned off to the hackers," he wrote.
Even nine months after Magento patched the Shoplift Bug, a rash of new infections was detected that delivered the Neutrino exploit kit. In those instances, compromised Magento sites pulled content from a malicious domain that tried to deliver malware to victims using Neutrino.
The vulnerable Magento versions are CE prior to 22.214.171.124 and EE prior to 126.96.36.199.
Sinegubko recommended that Magento admins ensure they're using the latest version, change passwords, investigate admin accounts and monitor the integrity of Magento's files.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.