Skip to content

Commit 10539a4

Browse files
committed
Add usage instructions to usage.md
1 parent f75cb44 commit 10539a4

File tree

1 file changed

+36
-1
lines changed

1 file changed

+36
-1
lines changed

docs/usage.md

-1
This file was deleted.

docs/usage.md

+36
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
2+
# Scan your store in 5 minutes
3+
4+
eComscan is the mwscan successor and we recommend everyone to upgrade. Scan your system in 5 minutes. Run this command in a SSH terminal:
5+
6+
```
7+
curl https://ecomscan.com | sh
8+
```
9+
10+
Read more about [eComscan](https://sansec.io/?mwscan). It is developed by [Sansec](https://sansec.io/?mwscan), experts in Magento store security and Adobe Commerce security partner.
11+
12+
### eComscan features
13+
14+
- 50 thousand malware signatures and counting
15+
- Detects vulnerabilities in popular ecommerce platforms (Magento, Woocommerce, Prestashop etc) and third party ecommerce components
16+
- Monitoring of files, databases, processes, cron...
17+
- Get instant, actionable alerts via mail, Slack or API webhook
18+
19+
The Sansec threat intel team [investigates](https://sansec.io/research?mwscan) hundreds of hacked stores per month, and adds new attack signatures multiple times per day. eComscan is the best solution to protect your Magento store from emerging threats.
20+
21+
### Sample command line scan
22+
![Sample CLI scan output](https://sansec.io/assets/posts/screens/screenshotb.png)
23+
24+
### Sample report
25+
![Sample GUI scan output](https://sansec.io/assets/posts/screens/screenshot_mail.png)
26+
27+
# Who uses it?
28+
29+
Mwscan and its successor eComscan are used by Adobe, the [US Department of Homeland Security](https://www.dhs.gov/topic/cybersecurity), the [Magento Marketplace](https://twitter.com/jason_c_cochran/status/850043415194685441), [Magereport](https://www.magereport.com) and many of the [global top ecommerce agencies](https://sansec.io/partners).
30+
31+
# About payment skimming and Magecart
32+
33+
Online payment skimming (aka [MageCart](https://sansec.io/what-is-magecart)) is a growing threat to digital stores. Since our first publication in [2015](https://sansec.io/research/widespread-credit-card-hijacking-discovered/), we identified more than [90.000 compromised stores](https://twitter.com/gwillem/status/1050480393743491074). In most cases, malware is inserted that will a) intercept customer data, b) divert payments or c) uses your customers for cryptojacking.
34+
35+
Privacy watchdogs and online regulators are increasingly handing out fines to companies who suffered a Magecart attack.
36+

0 commit comments

Comments
 (0)