> Magesolution (MGS) did not respond, but the backdoored packages can still be downloaded from their site as of Apr 30th.
> Tigren denies to have been hacked, but the backdoored packages are still available on their site as of Apr 30th.
> Meetanshi claims that their software has not been tampered with, but confirmed that their server got hacked.
pixl97 · 17h ago
Not that strange, unless forced by law vendors will commonly deny all knowledge and responsibility.
xiphias2 · 20h ago
These all look like some Adobe plugin (sold by Adobe store)
GenerocUsername · 20h ago
Thanks. I was skimming article but it seemed like it was missing some critical context
blargthorwars · 20h ago
A lot of latent payloads are going to be activated ASAP before automated AI detection becomes the norm. AI ain't perfect, but it's good at this sort of thing.
McGlockenshire · 19h ago
> The $licenseFile can be controlled by the attacker using the adminUploadLicense function
This is just as likely to be an RCE as it is to be a backdoor. Calling `include` on a file the user can write to is just asking for it. This has been a known footgun for decades.
> Magesolution (MGS) did not respond, but the backdoored packages can still be downloaded from their site as of Apr 30th.
> Tigren denies to have been hacked, but the backdoored packages are still available on their site as of Apr 30th.
> Meetanshi claims that their software has not been tampered with, but confirmed that their server got hacked.
This is just as likely to be an RCE as it is to be a backdoor. Calling `include` on a file the user can write to is just asking for it. This has been a known footgun for decades.