Sleeper Supply Chain Attack Activates After 6 Years

May 6, 2025 A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21 Magento extensions from vendors Tigren, Meetanshi, and Magesolution (MGS). Security firm Sansec discovered that attackers had injected backdoors into these extensions as early as 2019, with the malicious code remaining dormant until activated in April 2025. The backdoor allows remote code execution, enabling attackers to upload and execute arbitrary PHP code on affected servers. 

The compromised extensions include Tigren’s Ajaxsuite, Ajaxcart, and MultiCOD; Meetanshi’s CookieNotice, CurrencySwitcher, and DeferJS; and MGS’s Lookbook, StoreLocator, and GDPR modules. 

The backdoor operates through a malicious ‘license check’ in files named License.php or LicenseApi.php, which execute attacker-controlled code via functions like adminLoadLicense. Earlier versions required no authentication, while later versions used hardcoded keys for access. 

Sansec advises merchants using these extensions to audit their installations immediately. Affected files should be removed, and servers should be scanned for additional malware. Restoring from clean backups is recommended to ensure system integrity. 

This incident is just another in a series that underscores the importance of supply chain security and the need for vigilant monitoring of third-party software components. 

For additional information, you can go to https://sansec.io/research/license-backdoor

 

 

Top Stories

Related Articles

January 15, 2026 After a year of growing protests over power bills, water use and unmet job promises, Microsoft on more...

January 14, 2026 Anthropic says that more than 90 per cent of the software powering new versions of Claude is more...

January 14, 2026 Lenovo is repositioning itself for a world where enterprise customers no longer want to be locked into more...

January 14, 2026 Anthropic is pushing deeper into healthcare with a new suite of AI tools aimed at doctors, insurers more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn