Skip to content Dark Web Informer - Cyber Threat Intelligence

A Threat Actor Claims to be Selling Shell Access to an Unidentified Magento Store in France

💡This post is part of Free Post Friday! If you're interested in subscribing to the platform please visit the subscriber page: https://darkwebinformer.com/status/#/portal/signup. If you would prefer to pay via cryptocurrency, please visit: https://darkwebinformer.com/crypto-payments

If you're interested in advertising please visit: https://darkwebinformer.com/advertising-rates/


🔎 Quick Facts

🔗 DarkWebInformer.com - Cyber Threat Intelligence
📅 Date: 2025-02-21 22:04:54
🚨 Title: Alleged Sale of Shell Access to an Unidentified Magento Store in France
🛡️ Victim Country: France
🏭 Victim Industry: Unknown
🏢 Victim Organization: Not specified
🌐 Victim Site: Not specified
📜 Category: Initial Access
🔗 Claim: https://forum.exploit.in/topic/254640/
🕵️‍♂️ Threat Actor: shellshop
🌍 Network: OpenWeb


📝 What Happened?

A threat actor known as shellshop is allegedly selling shell access to a Magento 2 store in France.

Key compromised data includes:

  • Full access to the file system and database
  • Ability to manipulate the payment form redirect
  • Recorded transaction details for PayPal, PayPlug, and bank transfers

📊 Compromised Access Details

  • Monthly Transactions:
    • PayPal Express: 81
    • PayPlug Payments Standard: 208
    • PayPlug Payments Oney: 4
    • PayPlug Payments Apple Pay: 40
    • Bank Transfers: 6
  • Yearly Transactions:
    • PayPlug Payments Standard: 2,208
    • PayPlug Payments Apple Pay: 611
    • PayPal Express: 853
    • PayPlug Payments Oney: 35
    • Bank Transfers: 107
    • Checkmo: 10

🛡 WhiteIntel.io Data Leak Information

(No victim site disclosed)


Implications

  • Potential Theft of Customer Payment Information
  • Risk of Payment Fraud & Unauthorized Transactions
  • Website Defacement & Malware Injection Risks
  • Financial & Reputational Damage for Affected Magento Store

  • Immediate Security Review: Check for unauthorized server modifications or file system access
  • Monitor Transactions & Payments: Look for fraudulent transactions and abnormal activity
  • Enhance Web Security: Implement firewall rules, WAF protections, and file integrity monitoring
  • Notify Customers & Authorities: If confirmed, inform affected parties to protect user accounts & payments

Stay informed on emerging cyber threats. Visit DarkWebInformer.com for real-time updates on security risks and breaches.

Latest