A new piece of malware has been identified by the Foregenix DFIR team. The malware is a PHP webshell - a script, which when installed on a compromised system, presents a sophisticated administration platform allowing the attacker to browse the filesystem of the compromised server, upload, create, edit, download or delete files or stop running processes.
We're over the moon to announce that Foregenix has been placed at No 59 in the 3rd annual Sunday Times Lloyds SME Export Track 100! Our fantastic clients and talented team were instrumental in helping us achieve this recognition. We are delighted, so thank you to all. This was published in the Business section on Sunday, as well as on the Sunday Times tablet edition and online.
The eCommerce sector has seen significant year-on-year growth over the last 5 years. With that growth, the world's most popular eCommerce platform, Magento, has seen seen rapid growth too (currently 26% marketshare globally).
With popularity comes a downside - Magento websites are increasingly becoming the target of attacks by criminals .
Over 60% of breached eCommerce websites assisted by our team in 2016 were Magento-based websites.
To begin, we'll take the following definitions of 'privacy' and 'information privacy' from the International Association of Privacy Professionals:
We have come across Manage Engine EventLog installations a few times in our penetration tests at Foregenix, and have identified different vulnerabilities in our attempts to compromise it. In most situations a default guest account was left open and becomes a focus point as we attempt to use it to elevate privileges or otherwise influence the profiles behaviour to our advantage. These attempts resulted in the following vulnerabilities being discovered and reported to the vendor. While the installations encountered during the engagements may not be running an up-to-date version of the ManageEngine EventLog software we validated whether the vulnerabilities still exist on the latest version as of the time of reporting them to the Vendor.
Topics: penetration testing
Following on from Encryption 101, this post will focus on different methods of Encryption, when they're applicable and why they are important.
Last month Magento released SUPEE-8788 to fix a number of security issues – you can read about SUPEE-8788 in detail here. A LOT of websites have not yet patched and are at risk of being hacked.
Written by Andrew McKenna, PCI, PA, P2PE-QSA at Foregenix
When it comes to talking about encryption, it’s important to ensure we’re speaking about the same thing – and to clarify and simplify some of the different implementations we see. Sometimes these are implemented for security and best practice, while other times they are implemented to tick a box. It's important to know the difference between encryption mechanisms, know when to use what and be able to identify and judge the security of particular implementations. This is the first of 2 or more posts.
You suspect your website may have been hacked and your priority is to get your online business back up and running as soon as possible. With a worldclass team of cybersecurity specialists, we can certainly help you to regain control of your website and secure your client data.
BUT, before you jump into fixing mode, here are a couple of critical steps you need to take to ensure you can handle any enquiries from law enforcement agencies, Visa, Mastercard, Amex and others if it turns out that payment card data has been stolen.
Topics: web security