Our experts conduct in-depth forensic investigations to trace attacks, recover encrypted data, and restore business operations with minimal downtime.

Gallery

Contacts

39b Alpha Park, Cleveland, OH 44143

+1 (844) 969-6683

Cyber Attack Data Breach News
The Magento Supply Chain Attack: Full Story of What Happened and Why It Matters

A sweeping supply chain attack has compromised hundreds of Magento-based e-commerce stores, raising urgent questions about the security of online retail platforms and the steps businesses must take to protect themselves and their customers. The breach, which lay dormant for years before being activated in April 2025, is one of the most significant supply-chain hacking incidents to hit the e-commerce sector in recent years.

Between 500 and 1,000 e-commerce sites have fallen victim to the coordinated supply chain attack targeting the leading e-commerce platform. The attackers infiltrated the software supply chain by injecting malicious backdoors into 21 popular Magento extensions, distributed by well-known vendors such as Tigren, Meetanshi, and Magesolution (MGS). These extensions, used for critical store functions like carts, shipping calculations, and wishlists, are widely adopted by online retailers worldwide.

According to Sansec, the cybersecurity firm that uncovered the breach, some of the backdoored extensions were compromised as early as 2019, but the malicious code only became active in April 2025. This sleeper attack allowed threat actors to bypass standard security mechanisms and gain access to sensitive customer data, including payment details.

The risks extend beyond stolen credit card data for B2B (business-to-business) e-commerce businesses (manufacturers, distributors, and wholesalers). Outdated or compromised plugins can disrupt ERP (enterprise resource planning) and CRM (customer relationship management) integrations, order cycles, and fulfillment operations, resulting in lost revenue and eroded customer trust. The incident also highlights the responsibility that comes with self-hosted, plugin-based e-commerce architectures: businesses must stay vigilant with updates, patches, and third-party software reviews.

Anatomy of a six-year sleeper attack

What makes this Magento supply chain attack especially alarming is its duration and sophistication. The attackers managed to inject backdoors into extension packages distributed between 2019 and 2022, but waited until April 2025 to activate the malware. This allowed the malicious code to remain undetected for up to six years, highlighting gaps in routine security audits and extension vetting processes.

Sansec’s investigation revealed that the servers of all three major extension vendors had been breached, enabling attackers to tamper with download servers and distribute compromised software to unsuspecting store owners. Once installed, the backdoored extensions provided attackers with admin-level access, allowing them to steal encryption keys, inject malicious code into checkout pages, and exfiltrate sensitive customer data.

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has since added the vulnerability (CosmicSting, CVE-2024-34102) to its Known Exploited Vulnerabilities Catalog, emphasizing the widespread risk to the e-commerce ecosystem.

Immediate steps every e-commerce business should take after a data breach

In the wake of Magento’s supply-chain hacking incident, e-commerce businesses must adopt a clear action plan for data breach response and long-term e-commerce security.

Immediate steps after a data breach include:

1. Contain and investigate the breach

Start by disconnecting the affected store from the network to prevent further damage. Change all admin passwords and reset API keys and payment gateway credentials to lock out attackers. Then, engage digital forensics experts to identify the breach’s scope, the entry point, and the data affected.

2. Notify stakeholders and maintain transparency

Develop a communication plan to inform affected customers, employees, and partners about the breach and the steps being taken. Avoid misleading statements; transparency is critical for maintaining trust and compliance with data protection regulations.

3. Seek expert assistance

Partner with digital forensics and incident response (DFIR) specialists to ensure a thorough recovery and to remove any trace of the malicious code. Porthas provides customizable Incident Response Retainers (IRR), a pre-arranged agreement guaranteeing rapid access to our cybersecurity experts during a cyber incident. Contact us 24/7.

Authors

  • As a content writer with over five years of experience, I combine journalism, psychology, and marketing expertise to craft insightful articles on cybersecurity and data recovery. With an MBA in Marketing and Communications, I stay current with the latest security news and data breaches, providing readers with timely insights and solutions. Drawing inspiration from J.R.R. Tolkien's works, I view cyber threats as our modern-day Sauron: ever-present and demanding vigilance. In my free time, I enjoy gaming, reading, or upgrading my PC, always seeking new ways to stay engaged and informed.

  • Laura Pompeu is a content editor and strategy leader at Porthas, bringing over 10 years of digital media experience. Leveraging her background in journalism, SEO, and marketing, Laura shapes cybersecurity and technology content to be insightful yet accessible.

  • Bogdan Glushko

    Bogdan Glushko’s experience and understanding of the cybersecurity landscape allow him to anticipate threats and devise effective strategies to combat them, keeping Porthas Inc. at the forefront of the industry. His passion for technology and commitment to excellence continue to drive the company’s success, making Porthas a trusted name in cybersecurity.