Some Magento sites have been infected with the Neutrino exploit kit Magento said Tuesday there does not appear to be a new vulnerability in its e-commerce platform that is causing some websites to become infected with the Neutrino exploit kit.Some of the affected websites appear to not have patched a code execution vulnerability nicknamed the Shoplift Bug Patch, Magento’s security team wrote in a blog post. A patch was released in February.Other Magento-powered sites have not applied other patches, making them vulnerable.The latest attack against Magento was highlighted by Malwarebytes and Sucuri, two security companies, who noticed attacks on the client and server sides. The infected Magento sites contained malicious scripts that created iframes, which pulled content from the malicious domain “Guruincsite.” That domain, which is blacklisted by Google, has been linked with the Neutrino exploit kit. Malwarebytes Malwarebytes showed how a person who lands on a compromised website running Magento is redirected to the Neutrino exploit kitIf encountered by someone browsing a website, exploit kits attack a computer, looking for software vulnerabilities in order to deliver malware. Hackers often try to plant code that triggers exposure to an exploit kit on legitimate, highly trafficked websites, as it creates an opportunity to infect many computers. Malwarebytes saw client-side exploits coming from Neutrino that try to exploit Adobe Systems’ Flash Player and installs malware called Andromeda/Gamarue, wrote Jerome Segura, a senior security researcher, on Sunday.“Compromised machines can be harvested for financial credentials and also become part of a large botnet,” he wrote.Magento warned that even if all patches have been applied to the software, it’s important to figure out if a website had been compromised prior to patching.Even if a flaw has now been patched, it’s possible the attackers created unauthorized administrative accounts, which would continue to give them access, Magento said.Magento, which is owned by eBay, is an attractive target for attackers since it’s used by a large number of companies, including Nike, Olympus and Ghirardelli Chocolate. It claims to be the most used software for the top 1 million websites ranked by Alexa. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe