Sleeper Supply Chain Attack Activates After 6 Years

May 6, 2025 A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21 Magento extensions from vendors Tigren, Meetanshi, and Magesolution (MGS). Security firm Sansec discovered that attackers had injected backdoors into these extensions as early as 2019, with the malicious code remaining dormant until activated in April 2025. The backdoor allows remote code execution, enabling attackers to upload and execute arbitrary PHP code on affected servers. 

The compromised extensions include Tigren’s Ajaxsuite, Ajaxcart, and MultiCOD; Meetanshi’s CookieNotice, CurrencySwitcher, and DeferJS; and MGS’s Lookbook, StoreLocator, and GDPR modules. 

The backdoor operates through a malicious ‘license check’ in files named License.php or LicenseApi.php, which execute attacker-controlled code via functions like adminLoadLicense. Earlier versions required no authentication, while later versions used hardcoded keys for access. 

Sansec advises merchants using these extensions to audit their installations immediately. Affected files should be removed, and servers should be scanned for additional malware. Restoring from clean backups is recommended to ensure system integrity. 

This incident is just another in a series that underscores the importance of supply chain security and the need for vigilant monitoring of third-party software components. 

For additional information, you can go to https://sansec.io/research/license-backdoor

 

 

Top Stories

Related Articles

March 23, 2026 David Shipley, co-host of Cybersecurity today is covering RSAC for Tech Newsday and Cybersecurity Today.  SAN FRANCISCO more...

March 23, 2026 This is another in our series of "Expert Voices" where we tap into our community of experienced more...

March 23, 2026 OpenAI is preparing to nearly double its workforce from about 4,500 to 8,000 employees by the end more...

March 23, 2026 Intel has informed major PC manufacturers it will raise prices on its consumer CPUs by about 10 more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn