Sansec (@sansecio) 's Twitter Profile
Sansec

@sansecio

Experts in ecommerce security. Helping merchants in times of peril. Tracking large scale digital skimming since 2015. PGP key 9D0D094CD2C7E669

ID: 1095983783646507008

linkhttps://sansec.io calendar_today14-02-2019 09:51:11

434 Tweet

1,1K Takipçi

16 Takip Edilen

MalwareHunterTeam (@malwrhunterteam) 's Twitter Profile Photo

So, I was expecting that the supply chain type attacks using those services/domains are going from sometimes past year already, but only now confirmed thanks to Nullify (x.com/nullifysecurit…) that it is going back to at least past June, so a little over 1 year

So, I was expecting that the supply chain type attacks using those services/domains are going from sometimes past year already, but only now confirmed thanks to <a href="/nullifysecurity/">Nullify</a> (x.com/nullifysecurit…) that it is going back to at least past June, so a little over 1 year
Sansec (@sansecio) 's Twitter Profile Photo

🚨 Critical Alert 🚨 Threat actors have began mass scanning for CosmicSting (CVE-2024-34102). Adobe released an isolated Magento security patch yesterday, which you should apply NOW if you somehow cannot upgrade. See article below H/t Hypernode! x.com/sansecio/statu…

Sansec (@sansecio) 's Twitter Profile Photo

🚨 CosmicSting attacks have started hitting major stores, with 3 to 5 stores being hacked every hour. Merchants might still be at risk despite patching. We cover some additional mitigation steps 👉 sansec.io/research/cosmi…

Germán Fernández (@1zrr4h) 's Twitter Profile Photo

Server with #opendir 213.109.147[.]108:4242 (now disabled) had an exploit for #CosmicSting (aka CVE-2024-34102), an Unauthorized XXE that combined with CVE-2024-2961 allows RCE in Magento and Adobe Commerce stores. On the server there was a TXT file with about 3900

Server with #opendir 213.109.147[.]108:4242 (now disabled) had an exploit for #CosmicSting (aka CVE-2024-34102), an Unauthorized XXE that combined with CVE-2024-2961 allows RCE in Magento and Adobe Commerce stores.

On the server there was a TXT file with about 3900
Sansec (@sansecio) 's Twitter Profile Photo

Say hi to Laski, the 8th CosmicSting attack group, using fake maintenance pages on deslgnhq[.]com and others. Fun fact: their infra went down several times, likely because they couldn't keep up with the high traffic hijacked stores. IOCs here sansec.io/research/cosmi…

Say hi to Laski, the 8th CosmicSting attack group, using fake maintenance pages on deslgnhq[.]com and others.

Fun fact: their infra went down several times, likely because they couldn't keep up with the high traffic hijacked stores.

IOCs here sansec.io/research/cosmi…
Sansec (@sansecio) 's Twitter Profile Photo

Beware: Group Peschanki hacks over 350 new stores in the last 5 hours #cosmicsting #magento sansec.io/research/cosmi…

Sansec (@sansecio) 's Twitter Profile Photo

😬 More than 2000 Magento stores hacked by Peschanki group in the last 20 hours and they're not slowing down. ☞ largest automated hack of Magento stores ever ☞ 6.8% of all Adobe Commerce / Magento stores worldwide hacked via CosmicSting exploit

😬 More than 2000 Magento stores hacked by Peschanki group in the last 20 hours and they're not slowing down. 

☞ largest automated hack of Magento stores ever
☞ 6.8% of all Adobe Commerce / Magento stores worldwide hacked via CosmicSting exploit
Zach Edwards (@thezedwards) 's Twitter Profile Photo

Our research was covered by Lorenzo Franceschi-Bicchierai of TechCrunch @ techcrunch.com/2024/10/22/res… Our whole investigation started after Sansec & gwillem reported on the polyfill[.]io supply chain compromise. A company called "FUNNULL" out of China were behind it. But wait, we know them?? 👀

Sansec (@sansecio) 's Twitter Profile Photo

3000 stores just got hit with the "statepulseapp[.]com" skimmer, injected by Group Laski. Sansec is the only vendor that recognises it: virustotal.com/gui/domain/sta…

3000 stores just got hit with the "statepulseapp[.]com" skimmer, injected by Group Laski. Sansec is the only vendor that recognises it: 
virustotal.com/gui/domain/sta…
Sansec (@sansecio) 's Twitter Profile Photo

Urgent: Adobe will drop critical patch tomorrow, outside of regular patch cycle. Fixes SessionReaper attack, affects Adobe Commerce / Magento 2.3.1+. Concept patch accidentally leaked. sansec.io/research/sessi…

Blaklis (@blaklis_) 's Twitter Profile Photo

Exceptionnally back on X for that. If you are a Magento or Adobe Commerce user, patch as soon as possible - the patch of my bug will be released imminently. This has one of the most severe impact possible, and is easy to trigger. Expect attacks, very soon. #magento #ecommerce

Sansec (@sansecio) 's Twitter Profile Photo

🚨 SessionReaper (CVE-2025-54236) is now actively exploited while 62% of Adobe Commerce/Magento stores remain unpatched. We expect automated mass attacks within 48 hours. sansec.io/research/sessi…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 New Adobe Commerce flaw (CVE-2025-54236, CVSS 9.1) under active attack. Over 250 exploit attempts in 24 hours—mostly on unpatched Magento sites. PoC is public. Patch now. Details → thehackernews.com/2025/10/over-2…

Pierluigi Paganini - Security Affairs (@securityaffairs) 's Twitter Profile Photo

Sansec Over 250 attacks hit #Adobe #Commerce and #Magento via critical CVE-2025-54236 flaw securityaffairs.com/183754/hacking… #securityaffairs #hacking

Help Net Security (@helpnetsecurity) 's Twitter Profile Photo

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236) - helpnetsecurity.com/2025/10/23/ado… - Adobe Assetnote Searchlight Cyber Sansec #Ecommerce #Vulnerability #Cybersecurity #CybersecurityNews