{"id":666,"date":"2024-10-02T11:51:12","date_gmt":"2024-10-02T17:51:12","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=666"},"modified":"2024-10-02T11:51:16","modified_gmt":"2024-10-02T17:51:16","slug":"magento-and-adobe-commerce-stores-are-victims-of-the-cosmicsting-attack","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/02\/magento-and-adobe-commerce-stores-are-victims-of-the-cosmicsting-attack\/","title":{"rendered":"Magento and Adobe Commerce Stores Are Victims of the CosmicSting Attack."},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h4>\n\n\n\n<p>Cybersecurity researchers have discovered evidence of a large-scale attack targeting Adobe Commerce and Magento online retailers. Roughly 5% of these online marketplaces have been compromised by the so-called &#8220;CosmicSting&#8221; security holes. With a <strong>CVSS [Common Vulnerability Scoring System (CVSS) ]<\/strong> severity rating of <strong>9.8<\/strong>, <strong>CVE-2024-34102<\/strong> is one of the most serious vulnerabilities that have been recently discovered. With the help of the mysterious researcher known only as &#8220;spacewasp,&#8221; Adobe patched this vulnerability in June 2024. But the vulnerability is still wreaking havoc on affected sites, even after applying the patch.<\/p>\n\n\n\n<p><img decoding=\"async\" data-src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdpjlYcjoJI2yYLgwn-hXRTKORYbYES4Q23vtmvIzLMQhl-u6BuRoLhBr4c17yPTvmj1h0IwRxz4EjLisU4S1QhHthG5750Uebz9kLCnF5WsufiRnRy9W3D-klqrPJe3YYDu4XOTzPxzWOq5BZpmg?key=KT9xxqxmnNFM3pV1itXF5A\" width=\"680\" height=\"382\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/382;\"><\/p>\n\n\n\n<p>                                                        Fig. 1.1<\/p>\n\n\n\n<p>Adobe Commerce and Magento e-commerce platforms are susceptible to the CosmicSting vulnerability.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Understanding the CosmicSting Exploit (CVE-2024-34102)<\/strong><\/h4>\n\n\n\n<p>An <strong>XML External Entity (XXE) <\/strong>vulnerability can be exploited by the CosmicSting Exploit (CVE-2024-34102) to execute remote malware on systems that have not been patched. This security hole allows remote attackers to potentially take control of the server and access any data stored there. One Dutch security firm, <strong>Sansec<\/strong>, has called this flaw the &#8220;worst bug to hit Magento and Adobe Commerce stores in the past two years.&#8221; Their research shows that every hour, <strong>three to five online stores<\/strong> are affected.<\/p>\n\n\n\n<p><img decoding=\"async\" data-src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXef5yITbdpr3K4WFkEZTSrnTHLx5cONFhGef9ciImXsvUS9uXBOxLjrpVNuSqmngISyciUdjygkqKh1OrZoL7vxIIPhT2SaumDXP3roJf2wCOnF9gN5Vuqy4AbYv4HlVIrQgxIp7XCLTrhWgNYdIA?key=KT9xxqxmnNFM3pV1itXF5A\" width=\"602\" height=\"472\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 602px; --smush-placeholder-aspect-ratio: 602\/472;\"><\/p>\n\n\n\n<p>                                                Fig. 1.2<\/p>\n\n\n\n<p><strong>The Effects and Exploitation<\/strong><\/p>\n\n\n\n<p>The consequences of CosmicSting are substantial. The private encryption key of Magento has been the target of multiple attacks that have taken advantage of this vulnerability. An attacker might use this key to create <strong>JSON Web Tokens (JWTs)<\/strong>, giving them full administrative access to the platform&#8217;s API. With this level of administrative access, hackers can use the <strong>Magento REST API<\/strong> to insert scripts that do harm to the website.Even with the latest patch applied, you may still be vulnerable to this exploit. If website owners really want to take security seriously, they should <strong>rotate their encryption keys<\/strong> on a regular basis. Patches that do not invalidate old keys leave systems vulnerable to attack.<\/p>\n\n\n\n<p><strong>Most recent Events: Unifying CosmicSting with CNEXT<\/strong><\/p>\n\n\n\n<p>In August 2024, together with CosmicSting, attackers began exploiting a new vulnerability called<strong> CNEXT <\/strong>(CVE-2024-2961). The CNEXT vulnerability is one way the <strong>GNU C library (glibc)<\/strong> could provide <strong>remote code execution<\/strong>. This impacts the <strong>iconv library<\/strong>. In order to get complete control of the infected systems, attackers can escalate their privileges by combining these two vulnerabilities.<\/p>\n\n\n\n<p>According to Sansec, when these two vulnerabilities are coupled, they provide a substantial danger. The combination of CosmicSting and CNEXT allows attackers to read any file they want and execute malicious code remotely. With <strong>ongoing access<\/strong> to the system, threat actors might install malicious scripts and steal critical information, including <strong>payment details<\/strong>, from unsuspecting consumers.<\/p>\n\n\n\n<p><strong>End Objectives: Predators and Victims of Identity Theft<\/strong><\/p>\n\n\n\n<p>Websites powered by Magento and Adobe Commerce are frequently targeted by assaults aimed at <strong>payment skimmers<\/strong>. These &#8220;skimmers&#8221; sneak up on consumers and transmit their credit card information to the store. Attackers use a variety of techniques to keep their malicious scripts secret and undiscovered.<\/p>\n\n\n\n<p>The activities in question have been associated with various distinct hacking groups. Some of the more prominent types are as follows:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Group Bobry<\/strong> \u2013 Utilising <strong>whitespace encoding<\/strong>, the code that controls a payment skimmer on an off-site server is concealed.<\/li>\n\n\n\n<li><strong>Group Polyovki<\/strong> \u2013 Injecting malicious scripts from <strong>cdnstatics.net\/lib.js<\/strong> is done by the Polyovki Group.<\/li>\n\n\n\n<li><strong>Group Surki<\/strong> \u2013The Surki Group uses <strong>XOR encoding<\/strong> to conceal JavaScript code.<\/li>\n\n\n\n<li><strong>Group Burunduki<\/strong> \u2013 A dynamic skimmer code can be accessed by Group Burunduki over a<strong> WebSocket<\/strong> hosted at <strong>wss:\/\/jgueurystatic[.]xyz:8101.<\/strong><\/li>\n\n\n\n<li><strong>Group Ondatry<\/strong> \u2013 The Ondatry Group uses their own virus to create what appear to be legitimate payment forms.<\/li>\n\n\n\n<li><strong>Group Khomyaki<\/strong> \u2013 The Khomyaki group uses a <strong>2-character URI<\/strong> (such rextension[.]net\/za\/) to steal sensitive financial data and send it to dubious websites.<\/li>\n\n\n\n<li><strong>Group Belki<\/strong> \u2013The Belki organisation uses a combination of <strong>CNEXT<\/strong> and <strong>CosmicSting<\/strong> to install backdoors and deploy skimmer malware.<\/li>\n<\/ol>\n\n\n\n<p><strong>Renowned Victims<\/strong><\/p>\n\n\n\n<p>The CosmicSting assault has compromised the data of well-known brands such as<strong> Ray-Ban<\/strong>, <strong>National Geographic<\/strong>, <strong>Cisco<\/strong>, <strong>Whirlpool<\/strong>, and<strong> Segway<\/strong>. Concerned about the scale of the attacks, the e-commerce community has begun to take action, and security agencies throughout the world have joined in. After adding CosmicSting to its <strong>Known Exploited Vulnerabilities (KEV)<\/strong> database, the United States <strong>Cybersecurity and Infrastructure Security Agency (CISA)<\/strong> urged enterprises to act immediately midway through July 2024.<\/p>\n\n\n\n<p><strong>Ways to Avoid Danger and Maximise Success:<\/strong><\/p>\n\n\n\n<p>Sansec has issued the following demands to all Magento and Adobe Commerce merchants due to the seriousness of the situation:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Upgrade to the latest version<\/strong> of Magento or Adobe Commerce, which includes patches for both <strong>CosmicSting<\/strong> and <strong>CNEXT<\/strong> vulnerabilities.<\/li>\n\n\n\n<li><strong>Rotate secret encryption keys<\/strong> to prevent unauthorised access via previously stolen keys.<\/li>\n\n\n\n<li><strong>Invalidate old encryption keys<\/strong> to ensure that attackers can no longer use them to gain access.<\/li>\n\n\n\n<li>Regularly monitor your system for signs of compromise, such as unexpected API calls or unauthorised script injections.<\/li>\n\n\n\n<li>Implement security measures like <strong>Web Application Firewalls (WAFs)<\/strong> and <strong>Intrusion Detection Systems (IDS)<\/strong> to detect and block malicious activity.<\/li>\n<\/ul>\n\n\n\n<p>Adobe Commerce and Magento are two e-commerce platforms that are especially susceptible to the CosmicSting vulnerability. By taking advantage of various security flaws, hackers might potentially gain control of websites and steal critical financial data. All affected companies must promptly implement measures to secure their platforms, repair any vulnerabilities, and rotate encryption keys. Serious financial losses and persistent exploitation can ensue from inaction.<\/p>\n\n\n\n<p><strong>Reference <\/strong><\/p>\n\n\n\n<p>Blog Post : <a href=\"https:\/\/thehackernews.com\/2024\/10\/alert-adobe-commerce-and-magento-stores.html\">https:\/\/thehackernews.com\/2024\/10\/alert-adobe-commerce-and-magento-stores.html<\/a><\/p>\n\n\n\n<p>Fig 1.1:<a href=\"https:\/\/www.canva.com\/design\/DAGSbH3th-w\/Q5BptwkpwRad7mVzDDVNJQ\/edit\"> https:\/\/www.canva.com\/design\/DAGSbH3th-w\/Q5BptwkpwRad7mVzDDVNJQ\/edit<\/a><\/p>\n\n\n\n<p>Fig 1.2 : <a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjJ-aFZ8MeXe6t9pFSqaQ9CmQbkQ6vdV6wDCTc0nXjuWaH7Kzr1xFXhWWEpTs5pSwf5mHBpZ3V53PG7t_boaqStYZD9nq6t9Sh6w8OLUBd8L0ssBsOM2sbwqRaq07l8Z0q9c2FWA5Zi6FczeTlnIovLbVHpH8KF0eBLLbFyPHkY6Pd-lazE5bltBtUTiQVP\/s728-rw-e365\/ray-ban.com_1725576279.png\">https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjJ-aFZ8MeXe6t9pFSqaQ9CmQbkQ6vdV6wDCTc0nXjuWaH7Kzr1xFXhWWEpTs5pSwf5mHBpZ3V53PG7t_boaqStYZD9nq6t9Sh6w8OLUBd8L0ssBsOM2sbwqRaq07l8Z0q9c2FWA5Zi6FczeTlnIovLbVHpH8KF0eBLLbFyPHkY6Pd-lazE5bltBtUTiQVP\/s728-rw-e365\/ray-ban.com_1725576279.png<\/a><\/p>\n\n\n\n<p>Cosmicsting :<a href=\"https:\/\/sansec.io\/research\/cosmicsting\">https:\/\/sansec.io\/research\/cosmicsting<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Cybersecurity researchers have discovered evidence of a large-scale attack targeting Adobe Commerce and Magento online retailers. Roughly 5% of these online marketplaces have been compromised by the so-called &#8220;CosmicSting&#8221; security holes. With a CVSS [Common Vulnerability Scoring System (CVSS) ] severity rating of 9.8, CVE-2024-34102 is one of the most serious vulnerabilities that have &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/02\/magento-and-adobe-commerce-stores-are-victims-of-the-cosmicsting-attack\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Magento and Adobe Commerce Stores Are Victims of the CosmicSting Attack.&#8221;<\/span><\/a><\/p>\n","protected":false},"author":686,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[6,28,11],"class_list":["post-666","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-data-breach","tag-isec601","tag-security","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Krupali Kanubhai Patel","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/krupali-kanubhai-patel\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/686"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=666"}],"version-history":[{"count":1,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/666\/revisions"}],"predecessor-version":[{"id":667,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/666\/revisions\/667"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}