Every day we find many Magento credit card stealers injected into different files: modules, core files, themes. Magento database is not an an exception. For…
Recently we wrote about how hackers hijacked payment process on an ecommerce site and redirected customers to a fake checkout page on a third-party site.…
In order to avoid detection and maintain access to compromised websites, attackers use different techniques to hide their malicious code. During our cleanup investigation we…
During an incident response process performed in our client’s website, one of our analysts found a very interesting web shell. Our tools detected a suspicious…