Most of you would be aware of WordPress, which is one of the most popular Content Management Systems (CMS). Just like WordPress, there is Drupal, an open source Content Management system used by over 1 million websites, including those run by governments and financial institutions.

Last month, Drupal’s security team released patch for a highly critical vulnerability (dubbed Drupalgeddon2), which if exploited could result in the remote attacker gaining complete control of the website.

Needless to say, all admins whose websites are running on Drupal are being advised to install the patch as quickly as they can. And this should be done on highest priority now (if not already) as researchers have released a proof of concept exploit for the vulnerability, meaning attackers can now easily use the vulnerability to gain control of your site.

In fact, attacks have already started happening, as it has been revealed that the vulnerability is being used to install miners for Monero cryptocurrency. Following is an excerpt taken from a thread on SANS ISC Infosec forums:

The exploit attempts are currently arriving at a pretty brisk pace. Here is one installing the standard xmrig Monero miner.

There are also similar reports on Twitter:

Even the Who’s Who of the website industry are discussing the matter, advising people to install the patch as soon as possible. Here’s a tweet from VP of Engineering at GoDaddy:

Drupal’s security team published a PSA yesterday, revealing they are aware of attacks using the vulnerability. The announcement also contains other useful information. Here’s an excerpt:

The security team is now aware of automated attacks attempting to compromise Drupal 7 and 8 websites using the vulnerability reported in SA-CORE-2018-002. Due to this, the security team is increasing the security risk score of that issue to 24/25

Sites not patched by Wednesday, 2018-04-11 may be compromised. This is the date when evidence emerged of automated attack attempts. It is possible targeted attacks occurred before that.

Simply updating Drupal will not remove backdoors or fix compromised sites.

If you find that your site is already patched, but you didn’t do it, that can be a symptom that the site was compromised. Some attacks in the past have applied the patch as a way to guarantee that only that attacker is in control of the site.

You can access the complete PSA here.

Stay connected with us on Twitter (@PiunikaWeb) to hear about all related developments as and when they occur

Tags

Honor

Dr. Aparajita Sharma
1227 Posts

Currently, I am pursuing Ph.D (Psychology), and have been teaching the same for past four years. Coming to PiunikaWeb, I know it was a complete switch over, but the idea was appealing enough to put in all the effort it called for. My work primarily involves research. Oh, and yes, some of the photographs you see here are clicked by me. Overall, I am enjoying whatever I am doing, and hoping you’ll also feel the same reading all my articles. You can find me on LinkedIN.

Next article View Article

[Update: Fixed] Android Auto showing weather for wrong locations, Google working on it

New updates are being added at the bottom of this story……. Original story (published on January 10, 2018) follows: A new Android Auto issue has come to light. Adding to...
Sep 03, 2021 1 Min Read