Skip to Content

Software Supply Chain Attack Hits FishPig

eCommerce software maker FishPig has acknowledged that hackers managed to infiltrate its server infrastructure and inject malicious code into the Helper/License.php file. FishPig notes that “it is best to assume that all paid FishPig Magento 2 modules have been infected,” and advises users to reinstall or update extensions


  • This is a far simpler software supply chain attack than SolarWinds, and yet still very impactful. The .php script drops a Rekoobe malware variant to disk and executes it. Threat actors dropped the malware to /tmp and executed it from there. This is where detection engineering comes into play. Hidden files executing from the /tmp directory, especially immediately after being written to disk, should be extremely rare. If you have the right telemetry in place, this is trivial to detect. The threat actors write to /tmp because it’s world writable and they can’t count on the web server running under a privileged account.
  • It looks like FishPig had no controls to detect a compromise of its software. No digital signatures and no verification that the software deployed on its download servers matches the software that should be deployed. Detection happened by a third party, not the vendor.
  • Follow the steps on the FishPig Security Announcement to verify if you are or are not affected; they provide a script which both checks your extensions and makes recommendations. Next you need to update/reinstall FishPig. Lastly you need to reboot to clear the malware from memory; this has to be done after clearing the compromised extensions.


    Ads Blocker Image Powered by Code Help Pro

    It looks like you are using an adblocker.

    Ads keep our content free. Please consider supporting us by allowing ads on