Magento Supply Chain Breach Exposes Thousands of E-Commerce Sites to Payment Data Theft

A deeply embedded backdoor in Magento extensions has surfaced after six years, affecting 500 to 1,000 e-commerce websites—including a $40 billion multinational. The long-dormant malware has now been activated, compromising sensitive customer data in a widespread supply chain attack.
- Between 500 to 1,000 Magento-based e-commerce sites compromised in a coordinated malware campaign.
- Sansec, a Dutch cybersecurity firm, revealed that 21 Magento extensions carried the same malicious backdoor.
- The malware was injected up to six years ago but only activated in April 2025, making the attack both long-term and stealthy.
- Victims include a $40 billion multinational and hundreds of other online retailers.
- Extensions from vendors like Tigren, Meetanshi, and Magesolution (MGS) were identified as the primary vectors.
- Attackers gained access to vendor download servers, injecting malware directly into the distribution supply chain.
- Some backdoored packages are still available for download, posing ongoing risks.
- Meetanshi confirmed a breach but denied code tampering. Tigren denied being compromised, while MGS has yet to respond.
- The campaign also includes a tainted Weltpixel GoogleTagManager extension, though its source remains unverified.
This sophisticated supply chain attack reveals the growing risk of deeply embedded malware in third-party software solutions. With attackers targeting trusted Magento extension vendors, e-commerce businesses must immediately review and audit their integrations, patch vulnerable components, and implement continuous security monitoring to prevent customer data theft.
Stay alert. Stay protected. Net Protector Cyber Security recommends regular audits of all third-party software and proactive threat detection mechanisms for every online business.
- Other (42)
- Ransomware (144)
- Events and News (27)
- Features (45)
- Security (468)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (44)
- Malware Alerts (215)
- Cyber Attack (263)
- Data Backup (11)
- Data Breach (99)
- Phishing (156)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (57)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (5)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (11)
- Impersonation phishing (1)
- DDoS (6)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)