In this attack, the hacker either adds a new payment method or plants a fake payment form. These tricks let him fish valuable credit card info. This particular hack was disclosed when one of Magento users reported to us that something fishy was going on with his website's payment gateway. When our engineers, scanned the website, they found that it indeed was hacked.
Being a successful e-commerce platform, Prestashop, no doubt, is a lucrative target for hackers. Hackers are continuously on hunt for an overlooked vulnerability in popular CMS(s). They are on the look out for new methods to deliver their payload like injecting malware in the traffic of open Wi-Fi via ARP poisoning. Further, a PrestaShop Malware is any kind of malicious code deployed by the hackers via a vulnerability in order to exploit a Prestashop store.
PrestaShop, needless to say, is one of the big names in the e-commerce industry. This free open-source CMS is currently being used by 250,000 online stores worldwide and is maintained and regulated by an efficient team of more than a hundred members, says wikipedia. However, we still cannot vouch for its immunity to cyber attacks. After being affected by spam last year, Prestashop is again hit in the same place.
When a site gets hacked, it seldom happens that the hacker has not left behind a malware to get access of the website again, in the future. This deliberate plantation of malicious codes in a website with an intention of further exploitation is known as "website backdoor". Backdoors basically serve as an entry gate for an attacker to exploit it again and again.
The buzz around exploitation in WordPress plugins was not yet down, when a new report of exploitation in WordPress theme Yellow Pencil Visual theme customizer surfaced. This theme was quite popular with more than 30000 active installations at the time it was taken down from the WordPress's official site. After the vulnerabilities in two of its software was made public by a security researcher, the attempts of exploitation soared. Due to the attacks that followed many sites are now redirecting to other malicious sites
A very severe SQLi vulnerability has been uncovered in popular WordPress Plugin - Advanced Contact Form 7 DB, having more than 40,000+ active installations. The vulnerability was first reported on March 26th, and the new patched version 1.6.1 has been made live two days ago on 10th of April. However, the current users still have reasons to worry as this vulnerability could be exploited by hackers having even a subscriber's account.
Attacks and vulnerability disclosures in WordPress do not seem to stop just yet. Another fresh exploit in one of the popular WordPress plugins- The Yuzo Related Posts is making headlines after it was reported that an XSS (cross site scripting) vulnerability has been targeted by the attackers to redirect users to malicious sites.
Managing content on the web now is just a matter of seconds affair, thanks to WordPress open-source structure. WordPress has been on the web since the time when blogging was only a new trend. WordPress has evolved with time and has created a successful ecosystem of plugins & themes developers and users. However, like any popular software solution, WordPress has its fair share of security vulnerabilities. Recently, the WordPress iOS app was found leaking sensitive access token of WordPress blog to third party websites. Apart from this, WordPress is one of the widely targeted CMS by attackers and thousands of users each year suffer from a WordPress site hacked. Weighing in on WordPress's security concerns, its CEO Matt Mullenweg once remarked that,
PHP is the backbone of almost every popular CMS today. Thanks to its simplicity and license-free nature, PHP is the preferred choice for dynamic website development. However, due to poor coding standards, compromising PHP sites has become relatively easy. The internet is full of help threads where users complain about custom PHP website hacked or PHP website redirects hack. This has led to a lot of negative publicity for PHP itself which is nowhere to be blamed for this. Shredding the myths on PHP security, Anthony Ferrara, a PHP core contributor, and a renowned security expert commented that,
Bluehost is a great and affordable way to host a site online. However, if the website has security lapses then the hosting can turn into a nightmare. Bluehost takes its security policy very seriously and therefore sites with a malware infection are typically banned or suspended. The frustrated users can be found scraping the web for articles like this which would help them to restore their suspended Bluehost site. However, unlike other articles, this one will not only tell you how to restore your site using Bluehost Malware scanner but also give some bonus security tips in the end to avoid such cases.