New CosmicSting Exploit Targets Adobe Commerce and Magento Stores
A new cybersecurity threat, dubbed CosmicSting, is wreaking havoc on Adobe Commerce and Magento stores. Exploiting a critical vulnerability (CVE-2024-34102), attackers are using remote code execution to infiltrate e-commerce platforms, steal sensitive data, and compromise entire systems.
- 5% of Adobe Commerce and Magento stores compromised due to the CosmicSting vulnerability (CVE-2024-34102), a critical flaw rated 9.8 on the CVSS scale.
- The vulnerability allows remote code execution by exploiting an improper restriction of XML external entity (XXE) reference, enabling attackers to gain full system control.
- The U.S. CISA added CosmicSting to its Known Exploited Vulnerabilities (KEV) catalog in July 2024 due to widespread attacks.
- Attackers are stealing Magento's secret encryption key to generate administrative API access tokens, allowing for further exploitation via Magento REST API.
- CosmicSting has been chained with CNEXT (CVE-2024-2961) to escalate attacks, allowing attackers to take over entire systems through remote code execution.
- Companies such as Ray Ban, National Geographic, Cisco, Whirlpool, and Segway have fallen victim to this exploit, with at least seven distinct threat actor groups involved in the attacks.
- Groups Bobry, Polyovki, Surki, Burunduki, Ondatry, Khomyaki, and Belki are using various techniques, including JavaScript injection, skimmer malware, and covert access to steal payment data.
- The attacks are happening at a rate of three to five compromises per hour, according to Dutch security firm Sansec.
CosmicSting highlights the growing threat landscape targeting e-commerce platforms, especially Adobe Commerce and Magento stores. Businesses must prioritize cybersecurity by upgrading to the latest versions, rotating encryption keys, and invalidating old ones to defend against these sophisticated exploits.
Net Protector Cyber Security offers comprehensive protection through advanced endpoint security, web security, real-time threat monitoring, and data loss prevention (DLP) to keep your digital assets secure from such attacks.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)