Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access

Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access

Posted on January 30, 2026January 30, 2026 By CWS

A vital safety breach has uncovered a number of Magento e-commerce platforms worldwide as risk actors efficiently exploited a extreme authentication flaw to realize full system management.

The assault marketing campaign, recognized in January 2026, represents probably the most vital waves of coordinated net server compromises in current months, affecting a whole lot of on-line shops throughout completely different areas and industries.

The vulnerability on the heart of this assault is CVE-2025-54236, also called SessionReaper, which permits unauthorized entry by reusing session tokens that weren’t correctly invalidated by the Magento utility.

These session tokens perform like digital keys that confirm a consumer’s identification.

216 sufferer websites recognized (Supply – Oasis Safety)

When Magento fails to destroy these keys after customers log off, attackers can intercept and replay them to realize entry as legit directors, bypassing all password protections and safety measures.

Oasis Safety analysts recognized a number of impartial intrusion incidents the place completely different risk actors exploited CVE-2025-54236 in opposition to Magento environments throughout varied geographical areas, demonstrating widespread data and weaponization of this flaw.

The analysis crew found that attackers had scanned for susceptible methods on an enormous scale, figuring out over 1,000 susceptible Magento APIs and efficiently compromising 200 web sites with root-level administrative entry.

An infection mechanism

The an infection mechanism reveals how attackers systematically leveraged this vulnerability to ascertain full management over sufferer infrastructure.

As soon as attackers gained preliminary entry by way of session hijacking, they escalated their privileges to acquire root entry, the very best degree of system management on Linux servers.

This persistence tactic allowed them to deploy net shells, that are small scripts that grant attackers distant command execution capabilities for ongoing system manipulation and knowledge theft.

Proof exhibits that compromised methods contained delicate recordsdata displaying system consumer accounts and credentials, indicating thorough system exploration and potential knowledge exfiltration.

The investigation uncovered command and management infrastructure working from Finland and Hong Kong, with separate risk actors conducting net shell deployment operations particularly focusing on Magento websites in Canada and Japan.

1,460 vulneralbe APIs, success_api_2025.txt (Supply – Oasis Safety)

The attackers maintained detailed logs of compromised web sites and deployed shell paths, demonstrating organized operational safety and systematic focusing on methods.

Organizations working Magento should instantly patch this vulnerability and audit their server logs for suspicious session token utilization.

Structured log entries itemizing sufferer URLs, deployed net shell paths, and management keys, 404_key.txt (Supply – Oasis Safety)

The widespread nature of this marketing campaign underscores the vital significance of well timed safety updates and steady monitoring of e-commerce platforms internet hosting worthwhile buyer knowledge and cost info.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Access, Attackers, Exploiting, Gain, Hijacked, Magento, Rootlevel, Vulnerability, Websites

Post navigation

Previous Post: NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation
Next Post: Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

Related Posts

100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild Cyber Security News
North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging Cyber Security News
Threat Actors Attack PayPal Users in New Account Profile Set up Scam Threat Actors Attack PayPal Users in New Account Profile Set up Scam Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News
Hackers Trick Users to Download Weaponized Microsoft Teams to Gain Remote Access Hackers Trick Users to Download Weaponized Microsoft Teams to Gain Remote Access Cyber Security News
Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News