Major Supply Chain Attack: Backdoor Found in Popular eCommerce Components

Featured Image
A coordinated supply chain attack has compromised multiple eCommerce vendors, with Sansec identifying 21 applications containing the same backdoor. The malware was inserted six years ago but was activated recently, allowing attackers to gain full control over eCommerce servers. Sansec estimates that 500 to 1000 stores are currently running compromised software.

Compromised Packages:

The following packages from Tigren, Meetanshi, and Magesolution (MGS) were found to contain backdoors:

| Vendor | Package |

|–||

| Tigren | Ajaxsuite |

| Tigren | Ajaxcart |

| Tigren | Ajaxlogin |

| Tigren | Ajaxcompare |

| Tigren | Ajaxwishlist |

| Tigren | MultiCOD |

| Meetanshi | ImageClean |

| Meetanshi | CookieNotice |

| Meetanshi | Flatshipping |

| Meetanshi | FacebookChat |

| Meetanshi | CurrencySwitcher |

| Meetanshi | DeferJS |

| MGS | Lookbook |

| MGS | StoreLocator |

| MGS | Brand |

| MGS | GDPR |

| MGS | Portfolio |

| MGS | Popup |

| MGS | DeliveryTime |

| MGS | ProductTabs |

| MGS | Blog |

Sansec confirmed that Tigren, MGS, and Meetanshi servers were breached, and attackers injected backdoors into their download servers.

🔗 Source: Sansec Report

You Should Know: Detecting & Mitigating Supply Chain Attacks

1. Check for Compromised Packages

If your eCommerce platform uses any of the listed packages, immediately audit your systems.

Linux Command to Check Installed Packages (Magento/WordPress):

 For Magento modules: 
ls -la app/code/Tigren/ 
ls -la app/code/Meetanshi/ 
ls -la app/code/MGS/

For WordPress plugins: 
wp plugin list --status=active --field=name | grep -E 'tigren|meetanshi|mgs'

2. Scan for Backdoors

Use Malware Scanners to detect suspicious PHP files:

 Find recently modified PHP files (potential backdoors): 
find . -type f -name ".php" -mtime -7 -exec ls -la {} \;

Check for obfuscated code (common in backdoors): 
grep -r "eval(base64_decode(" /var/www/html 

3. Block Suspicious IPs

If attackers already accessed your system, block malicious IPs:

 Check active connections: 
netstat -tulnp | grep -E '80|443'

Block an IP using iptables: 
iptables -A INPUT -s MALICIOUS_IP -j DROP 

4. Restore from Clean Backups

If compromised, restore from a known clean backup:

 Verify backup integrity before restoring: 
sha256sum backup.tar.gz 

5. Update & Patch

Ensure all software is up-to-date:

 For Magento: 
php bin/magento setup:upgrade 
php bin/magento maintenance:enable 

What Undercode Say

Supply chain attacks are becoming more sophisticated, with attackers planting malware years before activation. This case highlights the importance of:
– Regular code audits
– Strict vendor trust verification
– Automated malware scanning
– Network segmentation for critical systems

Key Linux Commands for Security Audits:

 Monitor file changes in real-time: 
inotifywait -m -r /var/www/html

Check cron jobs for malicious tasks: 
crontab -l 
ls -la /etc/cron.

Verify file permissions: 
find /var/www/html -type f -perm 777 

Windows Command for Detecting Backdoors:

 Check running processes: 
Get-Process | Where-Object { $<em>.Path -like "tigren" -or $</em>.Path -like "meetanshi" }

Scan for suspicious DLLs: 
dir C:\Windows\System32.dll | findstr /i "tigren meetanshi mgs" 

Expected Output:

  • Immediate removal of affected packages
  • Enhanced monitoring for unusual server activity
  • Implementation of strict supply chain security policies

Prediction

Future supply chain attacks will increasingly target open-source libraries, requiring stricter code signing and integrity checks across all software dependencies.

🔗 Read More: Sansec Report

References:

Reported By: Mthomasson Major – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram