Sleeper Supply Chain Attack Activates After 6 Years

A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21 Magento extensions from vendors Tigren, Meetanshi, and Magesolution (MGS). Security firm Sansec discovered that attackers had injected backdoors into these extensions as early as 2019, with the malicious code remaining dormant until activated in April 2025. The backdoor allows remote code execution, enabling attackers to upload and execute arbitrary PHP code on affected servers. 

The compromised extensions include Tigren’s Ajaxsuite, Ajaxcart, and MultiCOD; Meetanshi’s CookieNotice, CurrencySwitcher, and DeferJS; and MGS’s Lookbook, StoreLocator, and GDPR modules. 

The backdoor operates through a malicious ‘license check’ in files named License.php or LicenseApi.php, which execute attacker-controlled code via functions like adminLoadLicense. Earlier versions required no authentication, while later versions used hardcoded keys for access. 

Sansec advises merchants using these extensions to audit their installations immediately. Affected files should be removed, and servers should be scanned for additional malware. Restoring from clean backups is recommended to ensure system integrity. 

This incident is just another in a series that underscores the importance of supply chain security and the need for vigilant monitoring of third-party software components. 

For additional information, you can go to https://sansec.io/research/license-backdoor

 

 

Top Stories

Related Articles

May 31, 2025 Alphabet Inc., Google's parent company, experienced a significant stock decline of over 9% on Wednesday following revelations that more...

May 31, 2025 Microsoft is gaining ground on Amazon Web Services (AWS) in the cloud race. Currently AWS is the market more...

May 31, 2025 Nearly nine out of ten Canadian organizations have adopted generative AI tools, making it the top IT spending more...

May 31, 2025 A widely used open-source Go library, easyjson, used in healthcare, finance and even defence has come under scrutiny more...

Jim Love

Jim Is and author and pud cast host with over 40 years in technology.