PolyShell Attacks Hit Majority of Vulnerable Magento Stores as Identity Theft Reaches Industrial Scale
PolyShell Attacks Hit Majority of Vulnerable Magento Stores as Identity Theft Reaches Industrial Scale
We’re seeing some concerning patterns emerge this week that highlight just how quickly attackers can scale their operations when they find the right targets. The most immediate threat hitting e-commerce businesses is the ongoing PolyShell campaign, which has already compromised 56% of all vulnerable Magento stores – a staggering success rate that should have every online retailer checking their patch status right now.
The Magento Massacre
The PolyShell attacks targeting Magento stores represent exactly the kind of focused, high-impact campaign that keeps us up at night. We’re not talking about random scanning here – this is targeted exploitation of known vulnerabilities in Magento Open Source and Adobe Commerce version 2 installations.
What makes this particularly troubling is the success rate. When attackers can compromise more than half of vulnerable targets, it tells us two things: first, the exploit is reliable and probably automated, and second, too many organizations are running unpatched systems. If you’re running Magento, this isn’t a drill – check your version and patch status immediately.
The timing couldn’t be worse for e-commerce businesses heading into spring shopping season. A compromised online store doesn’t just mean data theft; it can mean stolen payment information, defaced websites, and the kind of customer trust damage that takes years to rebuild.
Apple’s Patch Tuesday (Every Day is Patch Day)
Meanwhile, Apple dropped another massive update, patching 85 vulnerabilities across all their operating systems. The good news? None of these vulnerabilities are currently being exploited in the wild. The less good news? Eighty-five vulnerabilities is a lot, even for Apple’s comprehensive approach to security updates.
What I find interesting is Apple’s coverage strategy here. They’re patching the last three macOS generations and the last two iOS/iPadOS versions, but only current versions of tvOS, watchOS, and visionOS get the updates. It’s a practical approach that balances security with development resources, but it also means older device users need to think seriously about upgrade paths.
The inclusion of Background Security Improvements is worth noting too. Apple’s been pushing these under-the-hood security enhancements that work without user intervention, which is exactly the kind of proactive defense we need more of across the industry.
The Attribution Dilemma
Here’s something that doesn’t get enough discussion in our daily security work: the risks of public attribution. A thoughtful piece from Dark Reading explores why publicly blaming specific entities for cyberattacks can backfire.
This hits close to home for those of us doing incident response and threat intelligence work. When we’re dealing with a breach, there’s often pressure to name names – whether it’s a specific threat group, nation-state actor, or even insider threat. But public attribution can escalate situations, invite retaliation, or even compromise ongoing investigations.
I’ve seen cases where premature attribution actually helped attackers by revealing how much we knew about their methods. Sometimes the best security decision is keeping your cards close to your chest, at least until you’ve fully contained the threat and gathered all the intelligence you need.
Industrial-Scale Identity Theft
Perhaps the most concerning trend highlighted this week comes from SentinelOne’s annual report, which warns of hackers exploiting compromised enterprise identities at industrial scale. They’re calling it a “mass-marketed impersonation crisis,” and that phrase really captures what we’re seeing.
This isn’t about sophisticated zero-days or advanced persistent threats. This is about attackers who have figured out how to weaponize legitimate credentials at scale. When someone has your valid username and password, all your perimeter security becomes irrelevant. They’re not breaking in – they’re walking through the front door with what looks like a legitimate key.
The “industrial scale” part is what should worry us most. This suggests organized, systematic credential harvesting and abuse. We’re probably looking at credential stuffing operations, phishing campaigns, and malware designed specifically to steal authentication tokens and session cookies.
Investment in Exposure Management
On a more positive note, Onit Security just raised $11 million for their exposure management platform. While funding news might seem routine, this particular investment tells us something important about where the security industry is heading.
Exposure management is becoming a critical discipline because traditional vulnerability management isn’t keeping up with modern attack surfaces. We need tools that can continuously map what we have, identify what’s exposed, and prioritize what actually matters. The fact that investors are backing this approach suggests the market recognizes that visibility and risk prioritization are fundamental problems we still haven’t solved.
The Bigger Picture
Looking at this week’s news together, I see a pattern: attackers are getting better at scale while defenders are still catching up. The PolyShell campaign shows how quickly threats can spread when they target the right vulnerabilities. The identity theft crisis shows how attackers have industrialized credential abuse. Even Apple’s 85-vulnerability patch demonstrates how much attack surface we’re all managing.
The good news is that solutions exist. We just need to implement them consistently and at scale. Patch management, credential security, and exposure visibility aren’t new concepts – but executing them well across entire organizations remains our biggest challenge.
Sources
- PolyShell attacks target 56% of all vulnerable Magento stores
- Apple Patches (almost) everything again. March 2026 edition.
- Blame Game: Why Public Cyber Attribution Carries Risks
- Onit Security Raises $11 Million for Exposure Management Platform
- Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne