Brute force attacks against Magento stores are unfortunately common, as with any popular web framework.

Fortunately, they are easily countered as they are often lazy attacks from automated scripts or botnets that try to use the default Magento paths to gain entry.

Our support team at ServerGuy can help implement any of the changes below to help protect your store.

To help protect Magento store against attacks, do the following:

  • Change the admin path from /admin to something less obvious, this is adjusted in your local.xml file near the bottom

<adminhtml>
<args>
<frontName><![CDATA[notadmin]]></frontName>
</args>
</adminhtml>

  • Change the <frontName> variable to adjust this and then clear the Magento cache.
  • Password or IP restrict your downloader using our panel access restrictions or a .htaccess file, you can also move the downloader out of the Magento web root completely when not actively using Magento Connect.
  • Update Magmi, older versions of Magmi are unsecured and can allow remote users to upload files for remote execution.
  • Keep any WordPress installations up to date within your Magento web root, they are another common source of malware.
  • Apply any missing patches for your store, our support can help apply these for you.  Most Magento 1.x patches are critical to the security.

All You Need to Know: Best 5 Magento Security Extensions 

Further securing your Magento admin

If changing the admin path is not sufficient, it is also possible to IP restrict it completely.

Contact ServerGuy for details on how to restrict this on our hosting.

Services we offer:

  1. Managed Magento Hosting for Businesses
  2. Managed WordPress Hosting for Business-Agency
  3. AWS Management
  4. DigitalOcean Managed
  5. Managed Cloud Server India
  6. Dedicated Server India

Enquire now and join 1000+ businesses who have blitzscaled their websites by choosing ServerGuy as their hosting partner.

Was this post helpful?

Share This