Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Home/Threats/Hackers Compromised 7,500+ Magento Websites to Upload Hidden
Threats

Hackers Compromised 7,500+ Magento Websites to Upload Hidden

More than 7,500 Magento-powered e-commerce websites have fallen victim to a sweeping cyberattack campaign since late February 2026. Attackers uploaded hidden malicious files into publicly accessible...

Sarah simpson
Sarah simpson
March 20, 2026 4 Min Read
0 0

More than 7,500 Magento-powered e-commerce websites have fallen victim to a sweeping cyberattack campaign since late February 2026. Attackers uploaded hidden malicious files into publicly accessible web directories across thousands of these compromised domains.

The attack has spread to over 15,000 hostnames, affecting commercial brands, government agencies, universities, and non-profit organizations spanning multiple countries, making it one of the most far-reaching Magento-focused campaigns observed in recent years.

Magento is one of the most widely deployed e-commerce platforms in the world, powering everything from small independent shops to large enterprise storefronts.

Its widespread adoption makes it an especially appealing target for attackers looking to compromise many websites at once with minimal effort.

Once a reliable exploitation method is discovered, threat actors can scale it rapidly — which is exactly what happened here, with thousands of unique domains falling victim within just a matter of weeks after the campaign began.

Netcraft researchers identified the campaign’s first activity on February 27, 2026, and have continued tracking its growth ever since.

Among the most notable victims are globally recognized organizations including Toyota, Fiat, Citroën, Asus, Diesel, Fila, Bandai, FedEx, BenQ, Yamaha, and Lindt.

Defacement observed on an e-commerce storefront environment (Source - Netcraft)
Defacement observed on an e-commerce storefront environment (Source – Netcraft)

While most compromises involved subdomains, staging environments, or regional storefronts rather than core production systems, some live customer-facing websites were briefly impacted before remediation efforts were put in place. 

Example of a compromised staging or regional storefront domain (Source - Netcraft)
Example of a compromised staging or regional storefront domain (Source – Netcraft)

The campaign’s reach extended well beyond the commercial world. Researchers also found defacements on regional government service domains, university websites in Latin America and Qatar, international non-profit infrastructure, and several domains associated with the Trump Organization — including trumpstore.com, trumphotels.com, and booktrump.com.

Despite the high-profile nature of some of these names, the evidence suggests these sites were not deliberately chosen. They were simply caught in a broad, indiscriminate sweep targeting vulnerable Magento infrastructure wherever it could be found.

Example defacement page displaying attacker aliases and “greetz” message (Source - Netcraft)
Example defacement page displaying attacker aliases and “greetz” message (Source – Netcraft)

Most of the defaced pages contained simple text files displaying the attacker handles — L4663R666H05T, Simsimi, Brokenpipe, and Typical Idiot Security — along with “greetz” messages, a common practice in the defacement community where attackers name their collaborators and allies.

A smaller set of defacements, appearing only on March 7, 2026, included geopolitical messaging. Analysts concluded this brief outbreak of political content was not the campaign’s core motivation but rather an isolated display that fell outside the normal pattern of activity.

How Attackers Got In: The File Upload Flaw

The attack appears to hinge on an unauthenticated file upload vulnerability affecting some Magento environments.

This type of flaw is dangerous because it allows an attacker to write files directly onto a web server without holding any legitimate account credentials. No login, no password — just a direct path to depositing files wherever the vulnerability allows.

Netcraft researchers confirmed this behavior by successfully uploading a .txt file to a test Magento instance running Magento Community 2.4.9-beta1, the platform’s latest available version at publication time.

Text file uploaded to a test Magento Community instance by Netcraft (Source - Netcraft)
Text file uploaded to a test Magento Community instance by Netcraft (Source – Netcraft)

This finding showed that even freshly updated Magento installations may remain exposed under certain server configurations. The vulnerable scope covers Magento Open Source, Magento Enterprise, Adobe Commerce, and Adobe Commerce with the B2B module.

While Adobe released a security bulletin for multiple Adobe Commerce vulnerabilities around this time, the specific behavior observed in this campaign does not appear to directly match those published fixes.

Analysts also noted that this campaign shares similarities with the SessionReaper Magento vulnerability from October 2025, which also involved unauthorized file access.

Many compromised pages were self-reported to Zone-H, a public defacement archive, by the notifier handle “Typical Idiot Security” — the same alias found embedded in the defacement content itself, pointing to an actor deliberately documenting their own activity to earn standing within the defacement community.

Organizations running Magento-based infrastructure are strongly advised to immediately review all exposed file upload endpoints, apply available Adobe Commerce security updates without delay, actively monitor web directories for unauthorized file additions, and thoroughly investigate any unexpected files found in publicly accessible server paths.

Given that new compromised sites were still appearing at the time of writing, prompt action is essential.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

VoidStealer Bypasses Chrome ABE Without Injection Variant Privilege

Next Post

Windows 11 March Update Breaks Teams & OneDrive Sign-

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us