Skip to content
  Sunday 9 November 2025
Trending
December 20, 2023EFACEC UC 500E | CISA June 7, 2024Cybersecurity Engineer September 12, 20232024 University Graduate (U.S.) – Cybersecurity Engineer June 30, 2024Senior Consultant, Cybersecurity – Platinion April 25, 2025Alliances/Channel Director – Cybersecurity/Digital Trans Space – Virtual June 20, 2024Lead Cybersecurity Recovery and Resiliency Engineer June 19, 2025Russian Hackers Use Gmail App Passwords to Bypass Security in Phishing Attack January 16, 2024CISA Adds One Known Exploited Vulnerability to Catalog November 24, 2023Business Development Representative – Cybersecurity and Related Arenas December 2, 2023Agent Racoon: A Backdoor Threat to Organizations in the Middle East, Africa, and U.S.
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Continuous Xurum Attacks Targeting E-commerce Websites through Severe Magento 2 Vulnerability
Industry News

Continuous Xurum Attacks Targeting E-commerce Websites through Severe Magento 2 Vulnerability

Mister CybersecurityMister Cybersecurity—August 14, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Command Execution Attacks May Be Enabled by a New Python URL Parsing Flaw

August 15, 2023

Chinese TA415 Exploits VS Code Remote Tunnels for Espionage on U.S. Economic Policy Experts

As tensions between the United States and China continue to escalate, a new threat has emerged in the form of Chinese cyber espionage targeting American economic policy experts. The group known as TA415 has been using advanced techniques to infiltrate the virtual workspace of these experts, leveraging remote tunnels in Visual Studio Code to spy on sensitive information.

By exploiting vulnerabilities in the popular code editor, TA415 has been able to gain unauthorized access to the computers of U.S. economic policy experts, allowing them to monitor their activities and gather intelligence on key economic strategies and policies. This covert operation has raised alarms among cybersecurity experts, who warn of the potential impact on national security and economic stability.

The use of Visual Studio Code remote tunnels for espionage marks a new frontier in cyber warfare, highlighting the importance of securing virtual workspaces and ensuring the protection of sensitive information. As the threat landscape continues to evolve, it is crucial for organizations and individuals to stay vigilant and take proactive measures to defend against cyber attacks.

In response to this growing threat, government agencies and cybersecurity firms are working to uncover the full extent of TA415’s activities and develop countermeasures to mitigate the risk of future attacks. By raising awareness of this issue and implementing robust security measures, the United States can better protect its economic interests and safeguard against foreign espionage.

September 17, 2025

US Unveils $500 Billion AI-Driven Infrastructure Initiative

January 22, 2025

Revolutionizing Software: How SBOMs are Key to Compliance

December 13, 2024



Since January 2023, there was an ongoing marketing campaign focusing on e-commerce websites that use Adobe’s Magento 2 software program. This marketing campaign, referred to as Xurum, exploits a crucial safety flaw in Adobe Commerce and Magento Open Source that has now been patched. If efficiently exploited, this flaw might result in arbitrary code execution. The attackers behind Xurum, believed to be of Russian origin, are primarily fascinated with payment stats from the orders made prior to now 10 days.

In addition to exploiting the safety flaw, the attackers have additionally contaminated some web sites with JavaScript-based skimmers. These skimmers gather bank card data and ship it to a distant server. The full extent of the marketing campaign is presently unknown.

The assault chain utilized by the attackers includes weaponizing CVE-2022-24086 for preliminary entry after which utilizing it to execute malicious PHP code. This code gathers details about the host and deploys an internet shell named wso-ng, disguised as a Google Shopping Ads part. The internet shell solely prompts when the attacker sends the cookie “magemojo000” within the HTTP request. Once activated, it accesses and exfiltrates details about the gross sales order payment strategies from the previous 10 days. The assaults conclude with the creation of a rogue admin consumer with the names “mageworx” or “mageplaza,” that are in style Magento 2 extension shops.

The internet shell wso-ng is an evolution of the WSO internet shell and features a hidden login web page to steal credentials. It additionally integrates with authentic instruments like VirusTotal and SecurityTrails to assemble details about the contaminated machine’s IP fame and different domains hosted on the identical server.

The attackers behind Xurum reveal a meticulous and focused method, specializing in particular Magento 2 cases reasonably than launching indiscriminate assaults. They present a excessive stage of experience in Magento and make investments appreciable time in understanding its internals and establishing their assault infrastructure.



Source hyperlink

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Advanced Cyber Attacks Used by Charming Kitten to Target Iranian Dissidents
Telegram and Discord: A New Remote Access Trojan Makes Its Presence Known
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Senior Engineer (DAST SME)

November 8, 20250
Careers

Senior Cybersecurity & Compliance Consultant

November 8, 20250
Careers

Sr. Lead Cybersecurity Architect

November 8, 20250
Careers

Cybersecurity Subject Matter/Functional Expert III

November 8, 20250
Careers

Cybersecurity Senior Data Analyst, Bureau of Audit Services

November 8, 20250
Careers

IT CYBERSECURITY SPECIALIST (CUSTSPT)

November 8, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Senior Engineer (DAST SME)
  • Senior Cybersecurity & Compliance Consultant
  • Sr. Lead Cybersecurity Architect
  • Cybersecurity Subject Matter/Functional Expert III
  • Cybersecurity Senior Data Analyst, Bureau of Audit Services

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures