Foregenix Blog

Alert: New PHP Webshell Identified

Posted by Benjamin Hosack on 03/03/17 11:50

A new piece of malware has been identified by the Foregenix DFIR team.  The malware is a PHP webshell - a script, which when installed on a compromised system, presents a sophisticated administration platform allowing the attacker to browse the filesystem of the compromised server, upload, create, edit, download or delete files or stop running processes.

Read More

Topics: web security, Magento

Foregenix named as rising Cyber Security export star in the Sunday Times SME Export Track 100

Posted by Kirsty Trainer on 27/02/17 17:02

We're over the moon to announce that Foregenix has been placed at No 59 in the 3rd annual Sunday Times Lloyds SME Export Track 100! Our fantastic clients and talented team were instrumental in helping us achieve this recognition. We are delighted, so thank you to all. This was published in the Business section on Sunday, as well as on the Sunday Times tablet edition and online.

Read More

Topics: web security, GDPR

Magento Security Tips - what can you do to protect your website?

Posted by Mike Hinton on 23/02/17 15:39

The eCommerce sector has seen significant year-on-year growth over the last 5 years. With that growth, the world's most popular eCommerce platform, Magento, has seen seen rapid growth too (currently 26% marketshare globally).

With popularity comes a downside - Magento websites are increasingly becoming the target of attacks by criminals .

Over 60% of breached eCommerce websites assisted by our team in 2016 were Magento-based websites.

Read More

Topics: web security, Magento, malware

Information Privacy, The General Data Privacy Regulation (GDPR) & Your Business

Posted by Andrew McKenna on 30/01/17 16:43

To begin, we'll take the following definitions of 'privacy' and 'information privacy' from the International Association of Privacy Professionals:

Read More

Topics: PCI, PA-DSS and P2PE, GDPR

Vulnerabilities on ManageEngine EventLog 10.7 through 11.2 (Service Pack 11023)

Posted by Benjamin Hosack on 23/12/16 11:29

We have come across Manage Engine EventLog installations a few times in our penetration tests at Foregenix, and have identified different vulnerabilities in our attempts to compromise it. In most situations a default guest account was left open and becomes a focus point as we attempt to use it to elevate privileges or otherwise influence the profiles behaviour to our advantage. These attempts resulted in the following vulnerabilities being discovered and reported to the vendor. While the installations encountered during the engagements may not be running an up-to-date version of the ManageEngine EventLog software we validated whether the vulnerabilities still exist on the latest version as of the time of reporting them to the Vendor.

Read More

Topics: penetration testing

Encryption 102: 5 Methods of Encryption (Part 2)

Posted by Andrew McKenna on 07/12/16 16:02

Following on from Encryption 101, this post will focus on different methods of Encryption, when they're applicable and why they are important. 

Read More

Topics: PCI, PA-DSS and P2PE, encryption

Magento Malicious JavaScript in Action

Posted by Benjamin Hosack on 08/11/16 14:48

Magento websites have been under attack from a new malicious JavaScript family of malware - our forensic team has been working with many hacked websites to help them regain control of their online businesses and to limit losses.

Read More

Topics: web security, Magento, malware, JavaScript

Magento Websites - Have You Patched SUPEE-8788 Yet?

Posted by Benjamin Hosack on 04/11/16 14:28

Last month Magento released SUPEE-8788 to fix a number of security issues – you can read about SUPEE-8788 in detail here.  A LOT of websites have not yet patched and are at risk of being hacked.

Read More

Topics: web security, Magento

Encryption 101 - How it works. (Part 1)

Posted by Andrew McKenna on 21/10/16 10:17

Written by Andrew McKenna, PCI, PA, P2PE-QSA at Foregenix

When it comes to talking about encryption, it’s important to ensure we’re speaking about the same thing – and to clarify and simplify some of the different implementations we see. Sometimes these are implemented for security and best practice, while other times they are implemented to tick a box. It's important to know the difference between encryption mechanisms, know when to use what and be able to identify and judge the security of particular implementations. This is the first of 2 or more posts.

Read More

Topics: PCI, PA-DSS and P2PE, web security

Your website may have been hacked - what next?

Posted by Benjamin Hosack on 08/10/16 14:49

You suspect your website may have been hacked and your priority is to get your online business back up and running as soon as possible.  With a worldclass team of cybersecurity specialists, we can certainly help you to regain control of your website and secure your client data.

BUT, before you jump into fixing mode, here are a couple of critical steps you need to take to ensure you can handle any enquiries from law enforcement agencies, Visa, Mastercard, Amex and others if it turns out that payment card data has been stolen.

Read More

Topics: web security