PITS Blog
  • Home
  • Services
    • Dedicated team Have your own development team at our location in Kerala, India. We tailor our employees individually to your project.
    • Website & web shop Get into the online business and sell your products around the clock. Or convince yourself with a modern website on desktop and mobile devices.
    • Application development We develop very individual web or software applications for you for a wide variety of needs.
    • Hybrid or native iOS & Android Apps Online business is often done on the go today, and the trend is rising. Invest now and make your software mobile-compatible.
  • Credentials
  • Technology
  • Process
  • About us
  • Contact
  • White papers
  • Jobs
  • Blog
  • Startups
�
Avatar

Magento sites – New Malware Issue

By Soumia George on October, 27 2015
demo post

By Visakh R N

WordPress and .NET

By Priyanka K

Roadmap to become a DevOps Engineer

By Francis Varghese

Gutenberg - More Than Just An Editor

By Priyanka K

Magento community has received reports that some Magento sites are being targeted by Guruincsite malware (Neutrino exploit kit).

The malware can take advantage of situations where an administrative account has been compromised through weak passwords, phishing, or any other unpatched vulnerability that allows for administrative access, so it is important to check for fake user accounts and for leftover demo accounts.

Magento merchants are advised to follow best practices to ensure the security of their sites as well as:

  • Check their sites for Guruincsite and other malware and security vulnerabilities that could be used in future attacks at http://magereport.com. This is a very useful Magento community project that is not affiliated with Magento.
  • Search for and remove any malicious scripts that have been injected into your pages. You can then submit an unblock request to Google using Google Webmaster. Instructions from Magereport on finding and fixing these scripts can be found here.
  • Please review all admin users in your system, including accounts with the username “admin” that could be left over from sample data installations. Remove any accounts that you are not actively using.
  • Implement all available patches ASAP to close any exploitable vulnerability. Please visit the Magento Security Center for a list of patches.

Visit the Magento Security Center at http://magento.com/security/news/important-security-update for more information on how to address this issue and make sure that you have implemented all recent security patches.

Source : http://magento.com/

We'd love to hear from you.

Contact us

Switzerland
thomas(at)pitsolutions(dot)com
+41 (0) 43 558 4360

India
enquiries(at)pitsolutions(dot)com
+91 (0) 471 270 0615 / 715

UAE
mohammed(at)pitsolutions(dot)com
+971 (0) 4 359 8610

USA
arnab(at)pitsolutions(dot)com
+1 (0) 703 945 8076

Copyright © 2019PIT Solutions AG.An ISO 9001:2015 certified company. All Rights Reserved

SCROLL TO TOP