{"id":16559,"date":"2020-09-16T14:48:50","date_gmt":"2020-09-16T14:48:50","guid":{"rendered":"https:\/\/www.webscale.com\/?post_type=blog&p=16559"},"modified":"2023-12-29T16:05:35","modified_gmt":"2023-12-29T21:05:35","slug":"largest-m1-breach-date-need-know","status":"publish","type":"post","link":"https:\/\/www.webscale.com\/blog\/largest-m1-breach-date-need-know\/","title":{"rendered":"The Largest M1 Breach to Date – What You Need to Know"},"content":{"rendered":"

Last weekend, there was a Magento 1 security breach that impacted more than 2000 storefronts, and that number could be higher. The attack used the “Magento Connect” section of Magento, also known as the downloader, to inject JavaScript code into the storefront.<\/p>\n

Many of these impacted merchants may have already signed up for post-Magento 1 end-of-life patches, and installing them as soon as they are available is critical to preventing the same attack from happening again. However, developing new patches, customizing them to the specific environment, and applying them can take weeks and sometimes months, using up valuable time and resources, during which the application remains exposed.<\/p>\n

True protection comes from having a hosting provider partner with a robust, proactive approach to scanning, monitoring, and acting upon risks as they occur, and preventing them from having any significant impact on the backend application. The strongest security solutions offer 360-degree protection<\/a> against exploits that may be deployed through the filesystem, bypassed over vanilla WAF rules, and executed through the browser, all unbeknownst to the application owners.<\/p>\n

Here are a few of the security measures Webscale uses to protect applications from exploits exposed by this attack:<\/p>\n