A large number of websites powered by eBay’s Magento e-commerce platform have been breached and abused to deliver malware, researchers warned over the weekend.
The campaign was analyzed by Sucuri, which observed the server side, and antivirus company Malwarebytes, whose researchers monitored the client side of the attack.
According to experts, the attackers compromised Magento websites and injected malicious scripts that create iframes from the “guruincsite.com” domain. The guruincsite website, which according to Google Safe Browsing has already infected more than 8,000 domains, is one of several domains that are part of a redirection chain ending on a Neutrino exploit kit landing page.
Neutrino is set up to exploit a Flash Player vulnerability in an effort to deliver the Andromeda/Gamarue malware, which can be used by cybercriminals to harvest financial information and enlist infected computers in a botnet.
Sucuri says Magento website owners can determine if they are affected by checking the design/footer/absolute_footer entry in the core_config_data table. However, since the injected script is sometimes obfuscated, administrators are also advised to scan the entire database for strings like “guruincsite” and “function LCWEHH(XHFER1){XHFER1=XHFER1”.
The attackers compromised Magento installations by exploiting a zero-day directory traversal flaw in Magmi, a third-party mass importer tool for Magento, Sucuri told SecurityWeek.
Trustwave reported last week that the vulnerability, which can be leveraged to obtain Magento credentials and database encryption keys, has been exploited in the wild. In this case, the attackers are exploiting the flaw to extract database credentials and inject malware directly into the databases of the vulnerable sites.
It’s not uncommon for Magento vulnerabilities to be exploited by malicious actors. In April, Sucuri reported spotting attacks exploiting a Magento flaw less than 24 hours after the existence of the issue was made public.
*Updated with confirmation from Sucuri that Magmi flaw has been exploited in this campaign

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
