Want create site? Find Free WordPress Themes and plugins.

Magento Security Exploit – Neutrino exploit kit/ GuruInc hack

UPDATE: Magento has delayed the release of the patch to early next week.

News is emerging of a large attack on Magento sites coming from malicious scripts that create irframes from ‘guruincsite’ dot com. Google has blacklisted thousands of sites because of it and Magento has posted a update on their site. The exploit was first discussed in a Sucuri blog post, who advised that:

“The malware is usually injected in the the design/footer/absolute_footer entry of the core_config_datatable, but we suggest scanning the whole database for code like “function LCWEHH(XHFER1){XHFER1=XHFER1” or the “guruincsite” domain name.”

The post also suggests that core files and extensions should be updated, and site users reviewed, as the vulnerability could have provided access to your database, giving hackers the ability to create malicious admin users.

Another check can be done at magereport.com which will scan your site for known Magento security vulnerabilities.

NOTE: Those who follow the Magento Patching Process should be safe, as is was patched out in early 2015.

For more information about the exploit you can also check out the malwarebytes blog.

We will update more as information becomes available.

Protection against this, and future unknown vulnerabilities could be found with a web application firewall like Tenzing Security Shield.

Did you find apk for android? You can find new Free Android Games and apps.