The Largest M1 Breach to Date – What You Need to Know

Last weekend, there was a Magento 1 security breach that impacted more...
by ANAND HARIHARAN | September 16, 2020

Last weekend, there was a Magento 1 security breach that impacted more than 2000 storefronts, and that number could be higher. The attack used the “Magento Connect” section of Magento, also known as the downloader, to inject JavaScript code into the storefront.

Many of these impacted merchants may have already signed up for post-Magento 1 end-of-life patches, and installing them as soon as they are available is critical to preventing the same attack from happening again. However, developing new patches, customizing them to the specific environment, and applying them can take weeks and sometimes months, using up valuable time and resources, during which the application remains exposed.

True protection comes from having a hosting provider partner with a robust, proactive approach to scanning, monitoring, and acting upon risks as they occur, and preventing them from having any significant impact on the backend application. The strongest security solutions offer 360-degree protection against exploits that may be deployed through the filesystem, bypassed over vanilla WAF rules, and executed through the browser, all unbeknownst to the application owners.

Here are a few of the security measures Webscale uses to protect applications from exploits exposed by this attack:

  • Web controls to immediately block access to the downloader.
  • Real-time CSP alerting and blocking to ensure only pre-approved domains are executing scripts.
  • Web controls to protect admin page access, with whitelisting and multi-factor authentication.

However, if you are not yet on the Webscale platform, there are still a number of things you can do to better protect your applications.

  1. Search access logs for evidence of known attack patterns. Did anyone search for MySQL.php, and what part of the system responded? You should also validate that your checkout page has no scripts executed from mcdnn.net.
  2. Restrict access to admin portions of your website through multiple mechanisms, since it is one of the most common gateways for hackers to exploit Magento.
  3. Block access to “/downloader”, or even delete the downloader since it is no longer in use for Magento 1.
  4. Check your code for malicious scripts, and block browsers executing scripts from unknown or unsafe domains.
  5. Restrict php access from the internet to only specific files.
  6. Build a secure architecture where the firewall cannot be circumvented.
  7. Automate security, so any unintended changes to the file systems are identifiable or blocked.

Webscale’s range of ecommerce hosting solutions do all of the above, and more, and protect over 3000+ storefronts with its security-centric platform and architectures for 6+ years.

If you’d like a no-strings consultation with one of our ecommerce security experts to discuss your situation, we’d love to help – just drop us a note to info@webscale.com.

Popular posts

[INFOGRAPHIC] ECOMMERCE HOLIDAY SHOPPING 2022: WHAT TO EXPECT AND HOW TO PREPARE?
by Jose Kunnappally | August 22, 2022

Ecommerce Holiday Shopping 2022: What to Expect and...

[INFOGRAPHIC] THE GLOBAL ECOMMERCE SECURITY REPORT
by Jose Kunnappally | April 18, 2022

The Global Ecommerce Security Report 2022

HOW A CDN CAN BOOST YOUR CORE WEB VITALS
by Jose Kunnappally | January 12, 2022

How a CDN can boost your Core Web...

3 WAYS TO WRITE BETTER CACHING MODULES IN MAGENTO
by PAUL BRISCOE | January 11, 2022

3 Ways to Write Better Caching Modules in...

Stay up to date with Webscale
by signing up for our blog subscription

Recent Posts

How To Identify Good vs. Bad Web Traffic
by Adrian Luna | February 4, 2026

How to Identify Good vs. Bad Web...

Web traffic refers to the visitors who access a website and interact with its content or features. Analytics tools track this activity so teams can measure both interest and performance,...
From Operations to Intelligence 800x430
by Ryan McVeigh | January 30, 2026

From Operations to Intelligence: Shaping the Future...

As I look ahead to 2026, I feel both optimistic and grounded. Optimistic about what is coming next, and grounded because much of what I believed when I joined Webscale...
What is a Carding Attack 800x430
by Adrian Luna | January 27, 2026

What Are Carding Attacks?

Carding attacks are a form of payment fraud that tends to operate under the radar until damage has already occurred. They involve unauthorized attempts to validate stolen credit card information...