Web Defacement Artifacts on Bangladesh Government Infrastructure Potentially Linked to Global Magento Exploitation Campaign

Published on 03-May-2026 16:00:00

Executive Summary

Cyber Threat Intelligence Unit of BGD e-Gov CIRT has identified multiple Bangladesh government web domains hosting suspicious artifact files such as gc.txt and uname.txt in publicly accessible directories. These files are commonly used by threat actors to verify unauthorized write access to web servers and claim defacement activities.

The observed artifacts coincide with indicators associated with a large-scale global web defacement campaign targeting Magento infrastructure, first reported on 27 February 2026. The campaign has resulted in the compromise of more than 15,000 hostnames across approximately 7,500 domains worldwide.

Technical analysis suggests attackers may be exploiting unauthenticated file upload vulnerabilities or remote code execution flaws in vulnerable web applications, allowing arbitrary files to be written to web directories. Although attribution remains unconfirmed, the observed artifacts match patterns reported in the global campaign where attackers uploaded plaintext files and subsequently reported compromised sites to public defacement archives.

Figure: Global Distribution of the Magento Defacement Campaign

Observed Indicators in Bangladesh

Threat intelligence monitoring detected several government infrastructure endpoints hosting unauthorized files.

Artifact

https://***cpanel.***.gov.bd/gc.txt : Defacement claim file

https://portal.*******.gov.bd/gc.txt : Defacement artifact

http://server***.*******.gov.bd/gc.txt : Defacement artifact

http://****.gov.bd/uname.txt : System verification artifact

https://****.gov.bd/uname.txt : System verification artifact

Observed Artifact Behavior: These files typically contain:

·      attacker handles or aliases

·      timestamps

·      proof-of-compromise text

·      server verification output

Such artifacts are often used by attackers to:

·      confirm successful exploitation

·      demonstrate file system write access

·      provide evidence for submission to defacement archives such as Zone-H

Figure: Correlation Graph of Web Defacement Artifacts Across Bangladesh Government Domains

Global Threat Context

Security researchers have documented a large-scale defacement campaign targeting Magento servers globally. Most defacements were reported to Zone-H, suggesting reputation-building activity within the defacement community. Key campaign characteristics include:

·      compromise of 7,500+ domains

·      more than 15,000 affected hostnames

·      exploitation of vulnerable Magento REST API endpoints

·      plaintext defacement artifacts uploaded to web directories

Threat actors involved in the campaign have used aliases including:

·      Typical Idiot Security

·      L4663R666H05T

·      Simsimi

·      Brokenpipe

Technical Root Cause Analysis

PolyShell Vulnerability (APSB25-94): The campaign has been linked to the PolyShell vulnerability, affecting Magento Open Source and Adobe Commerce.

Vulnerability Type: Unauthenticated Arbitrary File Upload

Affected Component: Magento REST API file upload functionality

Attack Mechanism: The vulnerability allows attackers to upload files encoded in base64 format through REST API endpoints without proper validation.

Example attack workflow:

POST /rest/V1/products

Content-Type: application/json

Malicious payload example:

{

 "file": "base64_encoded_payload"

}

If server-side validation is misconfigured, the uploaded payload can be written to the filesystem.

Potential Outcome:

·      Arbitrary file upload

·      Web shell deployment

·      Remote code execution

·      Full server compromise

SessionReaper Vulnerability (CVE-2025-54236): Another vulnerability observed in similar campaigns is SessionReaper, a critical Magento RCE flaw.

CVSS Score: 9.1 (Critical)

Vulnerable Endpoint: /customer/address_file/upload

Exploitation Mechanism: The vulnerability exploits nested deserialization flaws, allowing attackers to execute arbitrary code via crafted payloads.

Attack Chain Reconstruction

The attack pattern observed in the global campaign typically follows the sequence below.

Stage 1 — Internet-wide Scanning:

Attackers scan for vulnerable Magento installations. Common scanning targets:

·      /rest/V1/ [Magento REST API]

·      /customer/address_file/upload [File upload endpoint]

·      /pub/media/ [Public media directory]

Stage 2 — Exploitation:

Attackers send crafted requests exploiting file upload vulnerabilities. Possible uploaded files include:

·      web shells

·      PHP backdoors

·      plaintext defacement artifacts

Stage 3 — Filesystem Write Access:

Attackers upload files such as: (These files are stored in publicly accessible directories.)

·      gc.txt

·      uname.txt

·      shell.php

Stage 4 — Proof of Compromise:

Attackers verify access by retrieving uploaded artifacts through HTTP requests.

Example: GET /gc.txt

Stage 5 — Public Defacement Claim:

The attacker reports the compromised domain to Zone-H or similar defacement archives.

Potential Impact

If exploitation is confirmed, attackers may gain:

·      persistent web server access

·      ability to upload additional payloads

·      access to sensitive application data

·      ability to modify web content

Possible consequences include:

·      website defacement

·      customer data exposure

·      payment card skimming

·      malware hosting

Get the PDF file