Written by Steve Perry
Published on

GuruInc JavaScript attack on Magento stores

Security company Sucuri have just announced that they are seeing an increased attack on Magento stores. The attack is in the form of hackers injecting malicious scripts that produce iFrames from the website “guruincsite[.]com”.

To find out if your Magento store has been attacked and, if so, how to fix this security issue get in touch right away and the request will be given a high priority. Alternatively if you would prefer to run a quick check yourself then you can do so by entering your URL at Magereport.com.

The Magento Team Added

Your site may be at risk. Take action today.

We are investigating reports of Magento sites being targeted by Guruincsite malware (Neutrino exploit kit). We have not identified a new attack vector at this time, but have found that nearly all impacted sites checked so far were vulnerable to a previously identified code execution issue for which we released a patch in early 2015; sites not vulnerable to that issue show other unpatched issues. The malware can also take advantage of situations where an administrative account has been compromised through weak passwords, phishing, or any other unpatched vulnerability that allows for administrative access, so it is important to check for fake user accounts and for leftover demo accounts.

Magento merchants are advised to follow best practices to ensure the security of their sites as well as:

  • Check their sites for Guruincsite and other malware and security vulnerabilities that could be used in future attacks at http://magereport.com. This is a very useful Magento community project that is not affiliated with Magento.
  • Search for and remove any malicious scripts that have been injected into your pages. You can then submit an unblock request to Google using Google Webmaster. Instructions from Magereport on finding and fixing these scripts can be found.
  • Please review all admin users in your system, including accounts with the username “admin” that could be left over from sample data installations. Remove any accounts that you are not actively using.
  • Implement all available patches ASAP to close any exploitable vulnerability. Please visit the Magento Security Center for a list of patches.

More information as available will be posted at https://magento.com/security.

Best regards,
The Magento Team

Steve Perry Creative Ltd

Studio and registered office: 4 Back Lane, Brown Edge, Staffordshire ST6 8QS.

Copyright © 2012 – 2023 Steve Perry Creative Ltd., unless otherwise noted.

Registered in England & Wales, number 08354632.


Typeset in Söhne Kräftig and Söhne Buch, by Klim Type Co.

Set as 32/64, 24/32, 20/32, and 12/16 on an 8px/96px grid.

Colour palette selected for AAA contrast.