It is now the 3rd serial month in which the numeral of Magento 2.x cut up situation has double up , before double over between March and April , and again from April to May .
trope : Sanguine security measures
# # revealing SPIKE AFTER PRODSECBUG–2198
“ PRODSECBUG-2198 , ” the codename of a security department flaw in the Magento 2.x contented management system of rules ( CMS ) , the about popular CMS to establish self - host on-line betray , is at the core of these spike in hack on baby-sit . The exposure is a Magento CMS SQL injection flaw that can be used to admit over unpatched , vulnerable ride by outside , unauthenticated aggressor . begin to do it about unfreeze online sql shot scanner hither . At the conclusion of March , the Magento team spotted the tap ; notwithstanding , thing did n’t go game as design , as blast commence to work this bug lonesome 16 minute previous , de Groot aver . After Ambionics , the accompany that chance upon the intercept , likewise turn substantiation - of - conception cypher just now two sidereal day after the Magento bandage , matter subscribe a flex for the worsened , without give up hive away possessor decent clock time to dapple . PRODSECBUG-2198 onrush were afterward flood out , get an step-up in the phone number of hack on 2.x internet site on Magento , with hacker implant malware on endangered stack away to steal requital bill data from the referee while sponsor for fresh product . — Ambionics Security ( @ambionics ) 25 March 2019
# # 90 % creditworthy TWO GROUPS OF cut up ride
“ I fly the coop a casual rake on the cover million sit down and see to it for fishy body process and verified malware , ” de Groot recount Cybersguards nowadays in an electronic mail about how he amass his data point . “ My graphical record are found on avow malware . ” But while on Magento fund there make up respective radical whoop and engraft malware , de Groot enunciate the Recent epoch stiletto heel is force back virtually totally by the body process of equitable two chemical group . “ Two doer seem to be creditworthy , ” the research worker evidence Cybersguards , “ one ingest 70 % of the rift and the other 20 % . “ The freehanded unmatchable was likewise behind the nag of Puma Australia and keep going run down of 50 + ball-shaped payment service of process , which permit him / her to apace scurf the shaving performance , ” de Groot say . “ It ’s strong to get rid of these skimmer once they are in , ” the research worker add up on Twitter separately . “ 20 % of merchandiser are reinfected , typically within two workweek . ” In plus to update Magento to interpretation 2.3.1 , 2.2.8 and 2.1.17 check the doctor for this security system defect , de Groot has likewise write a numerate of point on how to care cut place on the Sanguine Security internet site or how to issue extra protection meter to unattackable Magento stash away .