Ongoing Xurum Attacks on E-commerce Websites Exploiting Vital Magento 2 Vulnerability

Aug 14, 2023THNWeb page Stability / Vulnerability

Critical Magento 2 Vulnerability

E-commerce sites applying Adobe’s Magento 2 software package are the goal of an ongoing marketing campaign that has been energetic considering the fact that at minimum January 2023.

The attacks, dubbed Xurum by Akamai, leverage a now-patched important stability flaw (CVE-2022-24086, CVSS score: 9.8) in Adobe Commerce and Magento Open up Resource that, if properly exploited, could direct to arbitrary code execution.

“The attacker looks to be interested in payment stats from the orders in the victim’s Magento store placed in the past 10 days,” Akamai scientists said in an investigation released final week, attributing the marketing campaign to actors of Russian origin.

Some of the websites have also been noticed to be contaminated with easy JavaScript-primarily based skimmers which is built to accumulate credit rating card facts and transmit it to a distant server. The specific scale of the marketing campaign remains unclear.


In the assault chains noticed by the organization, CVE-2022-24086 is weaponized for first accessibility, subsequently exploiting the foothold to execute malicious PHP code that gathers info about the host and drops a website shell named wso-ng that masquerades as a Google Buying Advertisements part.

Not only is the world wide web shell backdoor operate in memory, it also activated only when the attacker sends the cookie “magemojo000” in the HTTP request, following which info about the profits order payment solutions in the earlier 10 times is accessed and exfiltrated.

The attacks culminate with the generation of a rogue admin person with the title “mageworx” (or “mageplaza”) in what appears to be a deliberate attempt to camouflage their actions as benign, for the two monikers refer to common Magento 2 extension merchants.

wso-ng is said to be an evolution of the WSO website shell, incorporating a new hidden login page to steal qualifications entered by victims. It more integrates with reputable applications like VirusTotal and SecurityTrails to glean the contaminated machine’s IP popularity and receive specifics about other domains hosted on the exact same server.

On the web purchasing web pages have been specific for several years by a course of assaults acknowledged as Magecart in which skimmer code is inserted into checkout web pages with the objective of harvesting payment info entered by victims.


“The attackers have shown a meticulous method, targeting unique Magento 2 scenarios relatively than indiscriminately spraying their exploits across the web,” the researchers claimed.

“They demonstrate a higher amount of knowledge in Magento and devote significant time in comprehending its internals, placing up attack infrastructure, and testing their exploits on genuine targets.”

In a associated advancement, Kaspersky disclosed that risk actors are ever more focusing on extensive-neglected and scaled-down internet sites with small to no targeted visitors, specially WordPress web pages, for web hosting phishing internet pages.

“Most of the time, phishers who hack WordPress websites do so by exploiting protection holes,” protection researchers Tatyana Machneva and Olga Svistunova claimed. “After a thriving exploitation attempt, hackers upload a WSO internet shell and use that to gain entry to the website control panel, circumventing the authentication stage.”

Identified this post intriguing? Observe us on Twitter and LinkedIn to examine far more exceptional material we publish.