Massive supply chain attack hits Magento ecosystem

Massive supply chain attack hits Magento ecosystem

A coordinated supply chain attack has come to light, compromising between 500 and 1,000 e-commerce stores globally through backdoored Magento extensions, according to cybersecurity researchers at Sansec.

The malware campaign, which affects 21 Magento extensions from at least four vendors, includes victims ranging from small online retailers to a multinational corporation valued at $40 billion.

“Multiple vendors were hacked in a coordinated supply chain attack,” Sansec reported. “We found 21 applications with the same backdoor. Curiously, the malware was injected six years ago, but came to life this week as attackers took full control of e-commerce servers. Sansec estimates that between 500 and 1000 stores are running backdoored software.”

Sansec's investigation revealed that some of the infected extensions had been containing malicious code since as early as 2019. However, the attackers only activated the embedded backdoors in April 2025.

The affected extensions are distributed by known Magento vendors, including Tigren, Meetanshi, and MGS. A compromised version of the Weltpixel GoogleTagManager extension was also identified, though Sansec could not confirm whether the breach originated at the vendor level or through another vector.

Tigren denied any breach, Meetanshi acknowledged a server breach but denied that any distributed extensions were affected. MGS has not responded to Sansec’s repeated alerts.

Each infected extension carries a stealthy PHP backdoor hidden within a file typically used for license checks—either License.php or LicenseApi.php. The malicious code listens for HTTP requests containing two specific parameters: requestKey and dataSign.

When these values match hardcoded keys in the PHP file, the backdoor silently activates, granting the attacker administrative-level capabilities. These include the ability to upload a new license file that can contain arbitrary code. Once uploaded, the malicious license is executed via the include_once() PHP function, giving attackers a direct foothold into the server.

Earlier versions of this backdoor required no authentication, but more recent iterations include hardcoded keys as a basic access control measure.


Back to the list

Latest Posts

Canada bans Chinese surveillance firm Hikvision over national security concerns

Canada bans Chinese surveillance firm Hikvision over national security concerns

From now on, all federal departments, agencies, and Crown corporations are prohibited from purchasing Hikvision products.
1 July 2025
US announced crackdown on North Korean IT workers schemes

US announced crackdown on North Korean IT workers schemes

As part of the action, the US authorities unsealed two indictments, arrested a suspect, conducted searchers across 16 states at nearly 30 known or suspected “laptop farms.”
1 July 2025
Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

The organization says the decision to discontinue expiration emails is driven by rising operational costs, increasing privacy concerns, and efforts to simplify its infrastructure.
30 June 2025