A newly documented attack known as PolyShell is allowing hackers to infiltrate online stores built on Adobe Commerce and Magento. This puts your payment details and personal information at risk every time you shop at an affected site.
What Is PolyShell?
PolyShell is malware that specifically targets a vulnerability in Adobe Commerce and Magento. These platforms are among the most popular for creating online stores. You can think of them as the engine that powers a retail website. If that engine has a weakness, attackers can open the hood and access everything inside.
According to Mashable, cybercriminals are exploiting this flaw to attack multiple web stores at once. Instead of focusing on just one store, they’re casting a wide net across many sites, similar to how a fisherman uses a net instead of a single line.
Why Adobe Commerce and Magento?
Adobe Commerce, built on the open-source Magento platform, powers a significant portion of e-commerce websites worldwide. Small boutiques, mid-sized retailers, and even some large brands use it. This widespread use makes it an attractive target for hackers. One successful exploit can open thousands of doors at the same time.
Magento has long been a favored target for web skimming or Magecart attacks. These attacks involve injecting malicious code into a checkout page to steal credit card numbers as customers enter them. PolyShell seems to follow a similar strategy, sneaking in through the vulnerability, often before store owners are even aware of it.
What Information Is at Risk?
When attackers exploit vulnerabilities like this, they can access:
- Credit and debit card numbers entered during checkout
- Names, addresses, and email addresses linked to customer accounts
- Order history and account login details
- In some cases, backend administrative access to the store itself
The threat isn’t always immediate or visible. Attackers often implant hidden code that gathers data over weeks or months before anyone realizes something’s off.
| Stat | Detail |
|---|---|
| Platform affected | Adobe Commerce (Magento) |
| Attack type | PolyShell malware via known vulnerability |
| Attack method | Mass exploitation (multiple sites targeted simultaneously) |
| Market share | Magento powers roughly 9% of all e-commerce sites globally |
| Risk data | Payment info, login credentials, personal details |
What This Means
If you’ve recently shopped at a small or mid-sized online store, it might be using Adobe Commerce or Magento without you realizing it. You wouldn’t see any warning signs. The checkout page would appear completely normal.
This situation puts a lot of responsibility on store owners, not shoppers. Customers can’t easily tell if a site has been patched. Adobe has released security updates in the past to fix vulnerabilities, and store owners need to apply those patches promptly. If they don’t, or if a new vulnerability arises before a patch is available, shoppers are left vulnerable through no fault of their own.
Right now, you can take a few practical steps to lower your risk: use a credit card instead of a debit card for online purchases (credit cards generally provide better fraud protection), enable transaction alerts from your bank, and consider using a virtual card number for one-time purchases if your bank offers that option.
Community Reaction
“This is why I use virtual card numbers for literally every online purchase. Had my info skimmed from a small store two years ago, and it was a nightmare to deal with.”
“Small business owners running Magento probably have no idea this is happening. They’re not security teams; they’re just people trying to sell stuff online.”
What Store Owners Should Do
If you operate an e-commerce site on Adobe Commerce or Magento, your first step is to check if your platform and all installed plugins are up to date. Adobe regularly releases security patches, and applying them quickly is the best defense against exploits like PolyShell. A web security scanner can help detect any malicious code that might already be on your site.
Security experts recommend reviewing any third-party extensions installed on your store. These extensions can introduce their own vulnerabilities, even if the core platform is current. You can read more about the attack details in Mashable’s full report.
What To Watch
- Adobe patch release: Keep an eye out for an official security advisory or patch from Adobe addressing the PolyShell vulnerability. They typically publish these through their security bulletin page.
- Breach disclosures: As affected stores discover compromises, some may be legally required to inform customers. Watch your inbox for data breach notifications from retailers you’ve recently purchased from.
- Security researcher updates: Firms tracking Magecart-style attacks are likely investigating the full impact of PolyShell. Expect more detailed reports on how many stores were affected and for how long in the coming weeks.










