Who wants a greater mousetrap when the previous one is ok?
That was the strategy of hackers who lately compromised a server operating open supply e-commerce platform Magento. To protect in opposition to the potential of being locked out of the server ought to the rightful operators ever uncover the breach, the attackers left behind a easy however efficient script.
To the bare eye, the script was simple to overlook amid numerous different Magento information. Analyzing the code inside, nonetheless, revealed that it was a backdoor that was activated by sending the server a easy and innocuous-looking Net request. With that, an attacker who in any other case might need been booted out of the server might immediately turn out to be a server administrator with unfettered management of the system.
Learn eight remaining paragraphs | Feedback