Connect with us

Technology

Hackers target online stores with new attack

Published

on

Hackers target online stores with new attack

NEWYou can now listen to Fox News articles!

A security researcher found a serious weakness in the software that powers thousands of e-commerce sites. The platform, called Magento, and its paid version Adobe Commerce, has a bug that lets attackers break into active shopping sessions. Some attackers can even take control of the entire store.

The flaw is known as SessionReaper. It allows hackers to pretend they are real customers without needing a password. Once they are inside, they can steal data, make fake orders, or install tools that collect credit card details.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Why is this attack so serious?

The problem starts in the part of the system that handles how a store communicates with other online services. Because the software does not properly check the information it receives, it sometimes trusts data that it should not. Hackers take advantage of this by sending fake session files that the store accepts as real.

Advertisement

Researchers at SecPod warn that successful attacks can lead to stolen customer data, fake purchases and even full control of the store’s server.

Once the attack method was shared publicly, cybercriminals began using it right away. Security experts at Sansec reported that more than 250 online stores were compromised within a single day. This shows how quickly attacks can spread once a vulnerability becomes public.

Hackers are exploiting a new flaw called SessionReaper to hijack active shopping sessions on thousands of e-commerce sites running Adobe Commerce and Magento. (Kurt Knutsson)

Why are many stores still unprotected?

Adobe released a security update on Sept. 9 to fix the issue. Weeks later, about 62% of affected stores still have not installed it. Some store owners are afraid an update might break features on their site. Others simply do not know how serious the risk is.

Every unpatched store remains an open door for attackers who want to steal information or install malicious code.

Advertisement

MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

How can you stay safe when shopping online?

While store owners are responsible for fixing the problem, you can still take smart steps to protect yourself when shopping online. These actions can help you spot danger early and keep your personal information safe.

1) Look for warning signs

Always pay attention to how a website behaves. If a page looks odd, loads slowly or shows error messages, it could mean something is wrong behind the scenes. Check for the small padlock symbol in the address bar that shows the site uses HTTPS encryption. If it is missing or the site redirects you to an unfamiliar page, stop and close the browser tab immediately. Trust your instincts if something feels off.

2) Be careful with email links and use a data removal service 

Cybercriminals often use fake promotional emails or ads that look like real store offers. Instead of clicking links in messages or banners, type the store’s web address directly into your browser to avoid phishing pages designed to steal your login details or card information. Since attacks like SessionReaper can expose your personal data to criminal marketplaces, consider using a reputable data removal service that continuously scans and deletes your private information, such as your address, phone number and email, from data broker sites. This reduces your risk of identity theft if your information has been leaked through a compromised online store.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Advertisement

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Cybersecurity teams at SecPod and Sansec tracked more than 250 stores breached within 24 hours of the exploit going public, showing how fast these attacks spread. (Kurt “CyberGuy” Knutsson)

3) Use strong antivirus software

Strong antivirus protection is your silent guard online. Choose reputable software that offers real-time protection, safe browsing alerts and automatic updates. A strong antivirus program can detect malicious code that tries to run on your device, block unsafe sites and alert you to potential threats. This adds another crucial layer of defense when visiting online stores that may not be fully secure.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Advertisement

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 

4) Use safe payment options

Whenever possible, choose payment services that add an extra layer of protection between your bank account and the online store. Platforms like PayPal, Apple Pay or Google Pay do not share your card number with the retailer. This reduces the chance of your information being stolen if the store is compromised. These payment gateways also offer dispute protection if a purchase turns out to be fraudulent.

5) Shop with trusted retailers

Stick to stores with a solid reputation. Well-known brands usually have better security and faster response times when issues arise. Before buying from a new website, check its reviews on trusted consumer sites. Look for signs of credibility such as clear contact information, a professional design and verified payment options. A few minutes of research can save you from weeks of frustration.

TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

6) Keep your devices updated

Updates may seem annoying, but they are one of the most effective ways to protect your data. Make sure your computer, smartphone and web browser all have the latest security patches installed. Updates often fix the exact kinds of flaws hackers use to spread attacks like SessionReaper. Enable automatic updates if you can, so your devices stay protected without extra effort.

Advertisement

7) Use unique, strong passwords

If you create accounts on shopping sites, make sure each one has its own strong password. Avoid using the same password across multiple platforms. Consider using a password manager to generate and store long, random passwords. That way, if one account is compromised, your other logins stay safe.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

8) Turn on two-factor authentication

If a site or payment service offers two-factor authentication, enable it. This adds a second security step, such as a code sent to your phone or generated by an app. Even if hackers steal your password, they will not be able to access your account without that second verification.

Even weeks after Adobe issued a critical patch for the SessionReaper vulnerability, nearly two-thirds of affected online stores remain unprotected, leaving customer data and payment information at high risk of theft. (CyberGuy.com)

Advertisement

9) Avoid public Wi-Fi for purchases

FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

Public Wi-Fi networks in places like cafés, airports and hotels are often unsecured. Avoid entering payment information or logging in to accounts while connected to public networks. If you must make a purchase while away from home, use a mobile data connection or a reliable VPN to encrypt your activity. 

10) Monitor your bank and credit statements

Check your financial statements regularly for any unusual activity. Small, unauthorized charges can be early signs of fraud. Report any suspicious transactions to your bank or credit card company right away so they can freeze your account or issue a new card.

11) Report suspicious activity

If you notice anything strange during or after an online purchase, act quickly. Contact the store’s customer service to report what you saw. You should also inform your payment provider or credit card company so they can block unauthorized transactions. Reporting early can help stop further damage and alert other shoppers to potential risks.

Kurt’s key takeaways

The SessionReaper attack shows how fast online threats can appear and how long they can linger when updates are ignored. Even well-known stores can become unsafe overnight. For retailers, installing patches quickly is critical. For shoppers, staying alert and choosing secure payment methods are the best ways to stay protected.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Would you still shop online if you knew hackers could be hiding behind a store’s checkout page? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com. All rights reserved.  

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

NASA did eventually solve Artemis II’s Outlook glitch

Published

on

NASA did eventually solve Artemis II’s Outlook glitch

On Thursday, during Artemis II’s journey to the Moon, commander Reid Wiseman ran into a tech issue some of us back on Earth can relate to: Microsoft Outlook wasn’t working. In a conversation captured in NASA’s Artemis livestream and shared on Bluesky, Wiseman reported to Mission Control: “I also see that I have two Microsoft Outlooks and neither one of those are working.”

To take care of the issue, Mission Control had to remotely access Wiseman’s personal computing device (PCD), a Microsoft Surface Pro. During a press conference on Thursday, Artemis flight director Judd Frieling said NASA had fixed the issue, stating, “This is not uncommon. We have this on-station all the time. You know, sometimes Outlook has issues getting configured, especially when you don’t have a network that’s directly connected. And so essentially we just had to reload his files on Outlook to get it working.”

NASA uses a combination of its Near Space Network and Deep Space Network to stay in touch with Artemis II, relying on a mix of antennas around the world and satellites in orbit. Mission Control at the Johnson Space Center in Houston, Texas has to shift communications between these networks as Artemis II gets further away from Earth.

Aside from the Microsoft Surface Pro, the Artemis II crew’s gear list also includes Nikon D5 DSLR cameras, a ZCube video encoder, and handheld GoPro cameras for filming content for a Disney/National Geographic documentary. The crew was also allowed to bring their phones with them — you can even see their phones being stowed away in their spacesuit pockets in NASA’s livestream.

Continue Reading

Technology

Fox News AI Newsletter: Palantir CTO warns US has only ‘eight days of weapons’ in hypothetical China battle

Published

on

Fox News AI Newsletter: Palantir CTO warns US has only ‘eight days of weapons’ in hypothetical China battle

NEWYou can now listen to Fox News articles!

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

– Palantir CTO warns US has only ‘eight days of weapons’ in hypothetical battle against China

– AI robot now helps travelers at San José airport

– New AI coalition targets Washington, Big Tech as group warns child safety risks outpacing safeguards

Advertisement

Palantir CTO Shyam Sankar discussed the looming threat of China and his new book, “Mobilize,” with Fox News Digital. (Fox News Digital/Nikolas Kokovlis/NurPhoto via Getty Images)

ARSENAL ALERT: The U.S. is wrong about military deterrence, according to Palantir CTO Shyam Sankar. America relies on the threat of its large weapons stockpiles to discourage aggression, but Sankar says the real deterrent is production capacity — “the ability to generate the stockpile.”

WIRED WELCOME: At San José Mineta International Airport in California, travelers can now get help from a humanoid robot named José. It greets passengers, answers questions and helps people find their way around the terminal.

DIGITAL DILEMMA: As artificial intelligence expands into classrooms, workplaces, and homes, a new coalition warns that risks to children and workers are growing faster than efforts to control the new technology.

Mark Zuckerberg, CEO of Meta, arrives to testify before the US Senate Judiciary Committee hearing, “Big Tech and the Online Child Sexual Exploitation Crisis,” in Washington, DC, on January 31, 2024.  (ANDREW CABALLERO-REYNOLDS/AFP via Getty Images)

Advertisement

The newly formed Alliance for a Better Future (ABF) is pushing for AI safeguards as Washington debates regulation.

DIGITAL WARFARE: For years, Silicon Valley operated as if war was someone else’s problem. Operation Epic Fury proved otherwise. The U.S.-Israeli campaign against Iran, launched Feb. 28, pulled American technology companies to the center of active warfare — not as distant suppliers, but as participants and now deliberate targets. In my forthcoming book, “The New AI Cold War,” I warned this moment was coming. Iran made it real.

Two F/A-18 Super Hornets launch from the flight deck of the U.S. Navy Nimitz-class aircraft carrier USS Abraham Lincoln in support of the Operation Epic Fury attack on Iran from an undisclosed location March 3, 2026.  (U.S. Navy/Handout via Reuters)

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

Advertisement

DOWNLOAD OUR APPS

Fox News
Fox Business
Fox Weather
Fox Sports
Tubi

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Advertisement

Continue Reading

Technology

AO3 is finally out of beta after 17 years

Published

on

AO3 is finally out of beta after 17 years

Archive of Our Own (AO3) is officially exiting beta. The Organization for Transformative Works — the nonprofit behind the fanfiction site — announced the update on Thursday, which comes 17 years after AO3’s launch in 2009.

“Since 2009, AO3 has grown and changed a lot,” the announcement says. “We’ve introduced many features over the years through the efforts of our volunteers and coding contributors, as well as the contractors we’ve been able to hire thanks to generous donations from our users.”

The post highlights some of the features that AO3 has since its launch, including a tagging system, fanworks downloads, privacy settings that allow creators to limit access to their work, and more. Just because AO3 is exiting beta, doesn’t mean the updates will stop flowing:

As the AO3 software has been stable for a long time, the change is mostly cosmetic and does not indicate that everything is finalized or perfectly working. Exiting beta doesn’t mean we’ll stop continuing to improve AO3—our volunteer coders and community contributors will still be working to add to and improve AO3 every day.

One of the most significant changes to the site is the absence of the tiny “beta” label inside the AO3 logo displayed at the top of the platform. (AO3 briefly changed the beta to “omega” for April Fools’ Day this year).

You can keep tabs on the updates coming to AO3 by viewing its projects on Jira

Advertisement
Continue Reading

Trending