Skip to Content
26 March, 2026

PolyShell attacks target 56% of all vulnerable Magento stores

PolyShell attacks target 56% of all vulnerable Magento stores

Table of Content

  • claire vinali
    Author

    Claire Vinali

  • Published

    26 Mar 2026

  • Reading Time

    15 mins

Imagine waking up to find your online store gone. The one you built with so much effort. Your customers’ payment details stolen. Your reputation ruined. This is the nightmare for thousands of store owners now.

We’ve been watching this with growing concern. On 19 March, just two days after it was made public, polyshell exploitation started. It hit Magento Open Source and Adobe Commerce version 2 installations worldwide. The speed was both breathtaking and terrifying.

Security researchers at Sansec have confirmed the scale of this magento security vulnerability. They found that polyshell attacks hit 56.7% of all vulnerable stores. That’s more than half. If your Magento store hasn’t been patched, the odds aren’t in your favour.

These magento malware attacks aren’t slowing down. They’re happening right now, on every continent. Australian retailers are at risk. We wanted to explain this clearly, honestly, and with steps you can take today.

Key Takeaways

  • Polyshell exploitation began on 19 March 2025, targeting Magento Open Source and Adobe Commerce version 2 stores globally.
  • Sansec confirmed that 56.7% of all vulnerable stores have been hit by this magento security vulnerability.
  • Attacks started just two days after the vulnerability was publicly disclosed, giving store owners almost no reaction time.
  • These magento malware attacks are currently ongoing and show no signs of stopping.
  • Australian e-commerce stores running unpatched Magento installations face significant and immediate risk.
  • Prompt patching and security monitoring are essential to protect your store and your customers’ data.

Understanding the PolyShell Magento Security Vulnerability

The PolyShell exploit is a major threat to Adobe Commerce security. It targets the REST API, turning it into a backdoor for attackers. This is a big problem for Australian store owners.

What Makes PolyShell Different from Previous Exploits

PolyShell uses polyglot files, which are valid in multiple formats. This means a single file can be an image and a PHP script at the same time. Traditional scanners miss these files because they look normal.

Old exploits used known weaknesses or outdated parts. PolyShell is different because it uses a trusted process. Without the latest security patches, stores are at risk.

The REST API Connection and File Upload Weakness

Magento’s REST API lets users upload files for custom cart options. Attackers use this to upload polyglot files. If the server settings allow it, the malicious code runs without being stopped.

This makes unpatched stores very vulnerable. The attack doesn’t need admin credentials, making it easier to exploit.

Remote Code Execution and Account Takeover Risks

Once a polyglot file is uploaded, attackers have two main ways to attack:

  • Remote code execution (RCE) — full server control
  • Account takeover via stored XSS — taking over admin and customer sessions
Risk Type Attack Method Severity Mitigated by Patches
Remote Code Execution Polyglot PHP file via REST API Critical Yes
Stored XSS Malicious script in uploaded file High Yes
Account Takeover Session hijacking through XSS High Yes
Data Exfiltration Server access post-RCE Critical Partial

We urge all Australian retailers to fix these security issues quickly. Applying the latest security patches is the most important step you can take now.

Timeline of the Mass Exploitation Campaign

The attack campaign caught many Australian store owners by surprise. We’ve seen how ecommerce platform vulnerabilities in Magento were used quickly after public disclosure. This left thousands of shops worldwide exposed.

Adobe released a fix in Magento version 2.4.9-beta1 on 10 March 2026. But, this patch was in a beta branch. So, most production stores hadn’t applied it yet. Just two days after the flaw was publicly disclosed on 17 March, attackers launched a mass exploitation campaign on 19 March 2026.

Security firm Sansec tracked the rapid spread in real time. In the first week, the campaign had compromised most vulnerable Magento installations. Attackers used magento sql injection exploits to get in, then escalated their access through the REST API weakness.

Here’s how the campaign unfolded:

Date Event Impact
10 March 2026 Adobe releases patch in version 2.4.9-beta1 Limited uptake — beta branch only
17 March 2026 Public disclosure of vulnerability details Exploit code becomes available to attackers
19 March 2026 Mass exploitation campaign begins Automated scanning targets unpatched stores
26 March 2026 Sansec reports 56% of vulnerable stores hit Majority of exposed Magento shops compromised

The gap between patch availability and stable release was dangerous. Attackers used this delay to exploit ecommerce platform vulnerabilities. Many retailers running Magento didn’t know about the beta-only fix or waited for a stable release.

This timeline shows just how quickly magento sql injection exploits can cause damage. Knowing these dates helps us prepare for what Australian retailers are facing now.

How Hackers Are Targeting Australian E-commerce Stores

Australian online stores are being targeted by PolyShell hackers. We’ve been watching their moves closely. The patterns show a worrying trend for local businesses. To keep Magento stores safe, we need to know how these hackers work and why they’re a big risk for us.

IP Addresses and Scanning Patterns We’ve Identified

Sansec found a list of IP addresses scanning for Magento vulnerabilities. These scans are not random. Hackers use tools to find store versions and look for open doors.

Here’s what we’ve seen in attacks on Australian stores:

  • Automated REST API probes hitting stores during off-peak AEST hours
  • Rapid sequential scanning of multiple domains hosted on the same server
  • Targeted file upload attempts within minutes of identifying a vulnerable endpoint
  • Reconnaissance activity originating from rotating IP addresses across multiple regions
Attack Pattern Frequency (AU Stores) Risk Level
REST API vulnerability scanning Up to 200 probes per day Critical
Malicious file upload attempts 50–80 attempts per day Critical
Admin panel brute force 100–150 attempts per day High
Payment skimmer injection 10–30 attempts per day Critical

Why Australian Retailers Are Particulary at Risk

Many Australian e-commerce sites run older Magento versions. Not patching quickly is a big problem. Smaller teams often don’t have enough security staff, so updates can be delayed for weeks or months.

Time zone differences also play a part. Patches from Adobe in the US may not reach Australian teams until the next day. Keeping up with security updates is now essential for survival.

The Novel WebRTC Payment Card Skimmer Attack

In 2024, a new payment card skimmer attack has been spotted. It uses Web Real-Time Communication (WebRTC) to steal card data. This is a big problem for Australian store owners already facing magento zero-day vulnerabilities.

How WebRTC Technology Bypasses Traditional Security

WebRTC is a browser feature for voice and video calls. Now, attackers use it to send stolen payment details. They do this through DTLS-encrypted UDP connections, avoiding standard web requests.

They connect to a server using WebRTC, bypassing normal checks. Security scanners won’t catch it because it doesn’t use HTTP.

DTLS-Encrypted UDP vs Standard HTTP Traffic

Feature Standard HTTP Exfiltration WebRTC DTLS-Encrypted UDP
Protocol HTTP/HTTPS (TCP) DTLS over UDP
CSP Blocked Yes No
Visible in Network Logs Easily detected Blends with media traffic
Encryption TLS (inspectable via proxy) End-to-end DTLS (harder to inspect)
Detection Difficulty Low Very High

The Lightweight JavaScript Loader Mechanism

The attack starts with a small JavaScript loader. It’s injected through magento zero-day vulnerabilities. This loader gets a second payload over WebRTC, avoiding CSP.

The skimmer waits to run, using requestIdleCallback. It only acts when the browser is idle. Australian retailers need to check for these attacks to protect customer data.

Adobe’s Response and Current Security Patches Status

Adobe has acknowledged the security issues with PolyShell in Adobe Commerce. But, their response has left many Australian store owners worried. On 10 March 2026, Adobe released a fix in version 2.4.9-beta1. The problem is, this update is in the beta branch, not the stable production channel.

This leaves most Magento stores running on production versions at risk. BleepingComputer asked Adobe when they would release patches for stable versions. Adobe hasn’t replied yet.

This delay is concerning for our Australian clients. Every day without a patch is another day attackers can use the REST API weakness. They can install skimmers without being detected.

“Patching delays in e-commerce platforms can cost retailers millions in fraud losses and erode hard-won customer trust.”

Here’s a quick snapshot of where things stand right now:

Version Patch Status Suitable for Production PolyShell Risk Level
Magento 2.4.9-beta1 Fix included No — beta only Low (if applied in staging)
Magento 2.4.8 (stable) No patch released Yes — current production Critical
Magento 2.4.7-p4 (stable) No patch released Yes — current production Critical
Magento 2.4.6-p9 (stable) No patch released Yes — current production Critical

We urge store owners to check Adobe’s security bulletin page every day. Until official patches are released for stable branches, it’s essential to follow the protective measures we suggest. This will help protect against the exploitation of these security flaws.

Protecting Your Magento Store from PolyShell Attacks

To keep your Magento store safe, you need a strong defence plan. PolyShell is targeting many sites, so it’s urgent for Australian store owners to take action. Applying security updates is a good start, but there’s more to do.

protecting magento stores from hackers with security measures

Immediate Security Measures We Recommend

Here are some key steps to take right now:

  • Install the latest security updates magento 2 patches from Adobe.
  • Check your REST API endpoints for any suspicious file uploads.
  • Look at your cart item custom options for unexpected code.
  • Limit admin panel access to trusted IP addresses only.
  • Turn on two-factor authentication for all backend accounts.

Content Security Policy Configuration Best Practices

A strong Content Security Policy (CSP) is vital for your store’s safety. The new WebRTC-based skimmer can get past some connect-src rules. So, your CSP needs careful attention.

CSP Directive Recommended Setting PolyShell Protection Level
script-src self only, no unsafe-inline High
connect-src Whitelist specific domains Moderate (WebRTC bypass risk)
default-src self with strict fallback High
frame-src none or trusted payment gateways High

Monitoring for Indicators of Compromise

Sansec has shared indicators of compromise (IoCs) to watch for. Use these in your monitoring tools. Look for unknown PHP files in your webroot and any UDP traffic that might mean data is being sent out.

A single missed patch can open the door to full remote code execution — proactive monitoring is not optional.

Do regular security checks to find and fix weak spots before hackers do. Keeping up with Magento 2 security updates is the best way to protect your store.

Impact on Major E-commerce Platforms and Enterprises

We often think big companies with lots of money are safe from hackers. But the PolyShell campaign shows this isn’t true. Ecommerce platform vulnerabilities affect all, no matter the size or income.

A global car manufacturer worth over $100 billion was hit hard. Security experts at Sansec found a payment card skimmer on their website. Despite warnings, the company didn’t act. This left customer payment data at risk for a long time.

The 56.7% infection rate in vulnerable Magento stores is shocking. It doesn’t matter if you’re a small Aussie shop or a big global brand. Magento SQL injection attacks can harm your store just the same. Hackers use tools that don’t care about your income before they attack.

Business Size Perceived Risk Level Actual Risk Level Common Gap
Small retailers (under $1M revenue) High High Limited patching resources
Mid-market ($1M–$50M revenue) Moderate High Delayed security updates
Enterprise ($50M+ revenue) Low High Complex approval workflows slow patching

Big companies face a special challenge. Their big systems and slow change processes make them vulnerable. Hackers use Magento SQL injection attacks before they can patch up.

Big breaches in e-commerce can be disastrous. They can leak millions of customer records and lead to big fines. The damage to a company’s reputation can cost much more than any security measures.

Speed of response matters more than the size of your security team.

In the next section, we’ll talk about how our team helps Magento store owners in Australia. We support all, from small shops to big operations.

What We’re Doing to Help Australian Magento Store Owners

Facing threats like PolyShell can be very stressful. Australian online stores need a team that really understands their market. We’ve created services to tackle every Magento security issue, from finding the problem to fixing it.

magento zero-day vulnerabilities security assessment for Australian stores

Our Security Assessment Services

Our team does detailed security checks for Australian Magento sites. We look for all kinds of threats, including PolyShell. Each check gives you a clear plan of what to do next.

Here’s what our assessment covers:

  • Full scan for known and new PolyShell threats
  • Review of REST API setup and access control
  • Check for patch gaps against Adobe’s latest security updates
  • Advice on making your Content Security Policy stronger
  • Search for WebRTC skimmers in payment areas

We help with applying patches and making your site more secure. Our advice is practical and fits your store’s needs.

Emergency Response Support for Compromised Stores

If your store has been hacked, time is of the essence. Our emergency team is ready to act fast. We’ll stop the threat, remove bad code, and make your site safe again quickly.

Call us at hello@defyn.com.au if you’re dealing with Magento issues or your current developer can’t fix the security problem.

Keeping your customers’ data safe and your brand’s reputation is our main goal. Whether you need a regular check or urgent help after an attack, we’re here to support you.

Conclusion

The PolyShell threat is a serious issue for Magento store owners. With 56.7% of vulnerable installations already hit, it’s one of the most aggressive campaigns we’ve seen. The danger comes from REST API exploitation, remote code execution, and a new WebRTC skimmer.

We urge every Australian e-commerce business running Magento to act fast. Check your security settings, apply Adobe patches, and set up strong Content Security Policies. Also, keep an eye out for any signs of compromise. Waiting is risky, as attacks are scanning and exploiting stores on a large scale.

If your store has been hit or you need help securing it, our team is here for you. Contact us at hello@defyn.com.au for a security check, emergency support, or customisation help. We’re dedicated to protecting Australian retailers from this threat and any future variants.

FAQ

What is the PolyShell Magento security vulnerability and why is it so critical?

PolyShell is a major Magento security vulnerability. It exploits a weakness in Magento’s REST API. This allows attackers to upload files and gain control over accounts. It’s different because it affects a large number of stores.Sansec found that 56.7% of all vulnerable stores were hit in the first week. This shows how fast threats can spread.

When did the PolyShell mass exploitation campaign begin?

The campaign started on 19 March. This was just two days after the vulnerability was made public. Adobe had released a fix on 10 March 2026, but it was too late.The quick spread shows how fast Magento zero-day vulnerabilities can be used by attackers.

Are there security updates for Magento 2 production versions available yet?

No, there aren’t. The fix is only in version 2.4.9-beta1, which is not yet stable. BleepingComputer asked Adobe about security updates Magento 2 for production, but got no answer.Store owners need to act fast and use temporary fixes until an official Magento security patches release.

Why are Australian retailers particularl at risk from PolyShell attacks?

Australian retailers are at risk because of delayed patching cycles. Many use older Magento versions. This makes it harder to patch quickly.Threat actors are scanning worldwide for vulnerable stores. So, protecting Magento stores from hackers is urgent for our local retailers.

How does the WebRTC payment card skimmer work and why is it so hard to detect?

The skimmer uses Web Real-Time Communication (WebRTC) to steal payment data. It sends data via UDP, not HTTP. This makes it hard to block.A lightweight JavaScript loader connects to a command-and-control server. It uses ‘requestIdleCallback’ to avoid detection. This makes it a sophisticated Magento malware attack.

What are the indicators of compromise we should look for in our Magento store?

Sansec has a list of IP addresses actively scanning for vulnerable stores. Use this to update your firewall rules.Watch for suspicious file uploads and unusual WebRTC connections. Regular security checks are key to spotting vulnerabilities.

Can Content Security Policy (CSP) protect my store from the PolyShell skimmer?

While CSP is important, it’s not enough. The skimmer can bypass even well-configured CSP restrictions. You need a layered approach to protect your store.This includes monitoring for Magento SQL injection exploits, suspicious file uploads, and unusual network traffic.

Were any major enterprises affected by the PolyShell attacks?

Yes. Sansec found the skimmer on a car manufacturer valued at over 0 billion. The 56.7% infection rate shows it affects all sizes of businesses.

What immediate steps should we take to protect our Magento store right now?

Block known malicious IP addresses and monitor your REST API file uploads. Check for suspicious files in cart item custom options.Do a security assessment of your web server. If you need help, contact us at hello@defyn.com.au.

How can we get professional help securing our Australian Magento store against PolyShell?

We offer security assessment services and emergency response for Australian Magento stores. Our team helps with patching and security hardening.If you’re running Magento Open Source or Adobe Commerce version 2 and need help, contact us at hello@defyn.com.au.

Insights

The latest from our knowledge base