BoardsOfCanada 16 hours ago

The vendor responses seem pretty strange:

> Magesolution (MGS) did not respond, but the backdoored packages can still be downloaded from their site as of Apr 30th.

> Tigren denies to have been hacked, but the backdoored packages are still available on their site as of Apr 30th.

> Meetanshi claims that their software has not been tampered with, but confirmed that their server got hacked.

  • pixl97 15 hours ago

    Not that strange, unless forced by law vendors will commonly deny all knowledge and responsibility.

xiphias2 17 hours ago

These all look like some Adobe plugin (sold by Adobe store)

  • GenerocUsername 17 hours ago

    Thanks. I was skimming article but it seemed like it was missing some critical context

blargthorwars 17 hours ago

A lot of latent payloads are going to be activated ASAP before automated AI detection becomes the norm. AI ain't perfect, but it's good at this sort of thing.

McGlockenshire 16 hours ago

> The $licenseFile can be controlled by the attacker using the adminUploadLicense function

This is just as likely to be an RCE as it is to be a backdoor. Calling `include` on a file the user can write to is just asking for it. This has been a known footgun for decades.