News: 1725652806

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Cisco merch shoppers stung in Magecart attack

(2024/09/06)


Bad news for anyone who purchased a Cisco hoodie earlier this month: Suspected Russia-based attackers injected data-stealing JavaScript into the networking giant's online store selling Cisco-branded merch.

Cisco has since fixed the issue caused by a flaw in Adobe's Magento platform, which could have allowed crooks to steal shoppers' credit card details and other sensitive information at checkout.

"A Cisco-branded merchandise website that's hosted and administered by a third-party supplier was temporarily taken offline while a security issue was addressed," a Cisco spokesperson told The Register .

[1]

"Based on our investigation, the issue impacted only a limited number of site users, and those users have been notified," the spokesperson said. "No credentials were compromised."

[2]

[3]

In this particular case, the unknown attacker(s) reportedly exploited [4]CVE-2024-34102 , a critical, 9.8-rated vulnerability in Adobe Magento software, widely used by eCommerce websites and a favorite target for thieves looking to intercept and steal transaction data from unsuspecting consumers. These types of [5]Magento-targeting exploits are collectively called Magecart attacks.

CVE-2024-34102, which puts unpatched systems at risk of XML external entity injection (XXE) and remote code execution (RCE), was [6]spotted by researcher Sergey Temnikov, who claims he reported the issue to Adobe and received a $9,000 bug bounty for this find.

[7]

Adobe [8]patched the flaw on June 11, but a week later, eCommerce monitoring firm Sansec [9]reported that only 25 percent of stores had upgraded their software. Meanwhile, criminals automated the attack to scale to thousands of sites, and multiple [10]proof-of-concept exploits popped up on GitHub and elsewhere.

[11]Magento shopping cart attack targets critical vulnerability revealed in early 2022

[12]Cisco's Smart Licensing Utility flaws suggest it's pretty dumb on security

[13]Let's kick off our summer with a pwn-me-by-Wi-Fi bug in Microsoft Windows

[14]To patch this server, we need to get someone drunk

It appears Cisco's merchandise store was one of these unpatched sites, and at the time of the attack was running Magento 2.4 (Enterprise).

According to c/side researchers who analyzed the malicious JS code, it was hosted on a domain with a Russia-based IP address. The domain, rextension[.]net/za/, was registered on August 30.

"The domain's recent registration raises red flags as it could indicate a fly-by-night operation designed for quick exploitation before being abandoned," c/side's Himanshu Anand [15]noted .

"Obfuscated scripts like these are difficult to detect without specialized monitoring, making them especially dangerous for both website owners and their customers," he added. ®

Get our [16]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Ztt7hKB_RdoT8WhwYRy1-wAAAYY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Ztt7hKB_RdoT8WhwYRy1-wAAAYY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Ztt7hKB_RdoT8WhwYRy1-wAAAYY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[4] https://nvd.nist.gov/vuln/detail/CVE-2024-34102

[5] https://www.theregister.com/2023/08/11/magento_shopping_cart_attack_targets/

[6] https://github.com/spacewasp/public_docs/blob/main/CVE-2024-34102.md

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Ztt7hKB_RdoT8WhwYRy1-wAAAYY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[8] https://helpx.adobe.com/security/products/magento/apsb24-40.html

[9] https://sansec.io/research/cosmicsting

[10] https://x.com/coffinxp7/status/1807385510169743782

[11] https://www.theregister.com/2023/08/11/magento_shopping_cart_attack_targets/

[12] https://www.theregister.com/2024/09/05/cisco_smart_licensing_utility_flaws/

[13] https://www.theregister.com/2024/06/12/june_patch_tuesday/

[14] https://www.theregister.com/2024/09/06/on_call/

[15] https://cside.dev/blog/cisco-client-side-magecart-javascript-attack

[16] https://whitepapers.theregister.com/



My mother was a test tube; my father was a knife.
-- Friday