Resultados 1 a 2 de 2
  1. #1
    WHT-BR Top Member
    Data de Ingresso
    Dec 2010
    Posts
    15,049

    [EN] Millions hit in Drupal hack attack

    Up to 12 million websites may have been compromised by attackers who took advantage of a bug in the widely used Drupal software.


    The sites use Drupal to manage web content and images, text and video.

    Drupal has issued a security warning saying users who did not apply a patch for a recently discovered bug should "assume" they have been hacked.

    It said automated attacks took advantage of the bug and can let attackers take control of a site.

    'Shocking' statement

    In its "highly critical" announcement, Drupal's security team said anyone who did not take action within seven hours of the bug being discovered on 15 October should "should proceed under the assumption" that their site was compromised.

    Anyone who had not yet updated should do so immediately, it warned.

    However, the team added, simply applying this update might not remove any back doors that attackers have managed to insert after they got access. Sites should begin investigations to see if attackers had got away with data, said the warning.

    "Attackers may have copied all data out of your site and could use it maliciously," said the notice. "There may be no trace of the attack." It also provided a link to advice that would help sites recover from being compromised.

    Mark Stockley, an analyst at security firm Sophos, said the warning was "shocking".

    The bug in version 7 of the Drupal software put attackers in a privileged position, he wrote. Their access could be used to take control of a server or seed a site with malware to trap visitors, he said.

    He estimated that up to 5.1% of the billion or so sites on the web use Drupal 7 to manage their content, meaning the number of sites needing patching could be as high as 12 million.

    Drupal should no longer rely on users to apply patches, said Mr Stockley.

    "Many site owners will never have received the announcement and many that did will have been asleep," he said. "What Drupal badly needs but doesn't have is an automatic updater that rolls out security updates by default."
    http://www.bbc.com/news/technology-29846539
    Última edição por 5ms; 31-10-2014 às 11:27.

  2. #2
    WHT-BR Top Member
    Data de Ingresso
    Dec 2010
    Posts
    15,049

    Drupal Core - Highly Critical - Public Service announcement - PSA-2014-003

    Description

    This Public Service Announcement is a follow up to SA-CORE-2014-005 - Drupal core - SQL injection. This is not an announcement of a new vulnerability in Drupal.

    Automated attacks began compromising Drupal 7 websites that were not patched or updated to Drupal 7.32 within hours of the announcement of SA-CORE-2014-005 - Drupal core - SQL injection.

    You should proceed under the assumption that every Drupal 7 website was compromised unless updated or patched before Oct 15th, 11pm UTC, that is 7 hours after the announcement.

    Simply updating to Drupal 7.32 will not remove backdoors.

    If you have not updated or applied this patch, do so immediately, then continue reading this announcement; updating to version 7.32 or applying the patch fixes the vulnerability but does not fix an already compromised website. If you find that your site is already patched but you didn’t do it, that can be a symptom that the site was compromised - some attacks have applied the patch as a way to guarantee they are the only attacker in control of the site.

    Data and damage control


    Attackers may have copied all data out of your site and could use it maliciously. There may be no trace of the attack.

    Take a look at our help documentation, ”Your Drupal site got hacked, now what”

    Recovery


    Attackers may have created access points for themselves (sometimes called “backdoors”) in the database, code, files directory and other locations. Attackers could compromise other services on the server or escalate their access.

    Removing a compromised website’s backdoors is difficult because it is not possible to be certain all backdoors have been found.

    The Drupal security team recommends that you consult with your hosting provider. If they did not patch Drupal for you or otherwise block the SQL injection attacks within hours of the announcement of Oct 15th, 4pm UTC, restore your website to a backup from before 15 October 2014:

    1. Take the website offline by replacing it with a static HTML page
    2. Notify the server’s administrator emphasizing that other sites or applications hosted on the same server might have been compromised via a backdoor installed by the initial attack
    3. Consider obtaining a new server, or otherwise remove all the website’s files and database from the server. (Keep a copy safe for later analysis.)
    4. Restore the website (Drupal files, uploaded files and database) from backups from before 15 October 2014
    5. Update or patch the restored Drupal core code
    6. Put the restored and patched/updated website back online
    7. Manually redo any desired changes made to the website since the date of the restored backup
    8. Audit anything merged from the compromised website, such as custom code, configuration, files or other artifacts, to confirm they are correct and have not been tampered with.

    While recovery without restoring from backup may be possible, this is not advised because backdoors can be extremely difficult to find. The recommendation is to restore from backup or rebuild from scratch.

    For more information, please see our FAQ on SA-CORE-2014-005.

    https://www.drupal.org/PSA-2014-003
    Última edição por 5ms; 31-10-2014 às 11:28.

Permissões de Postagem

  • Você não pode iniciar novos tópicos
  • Você não pode enviar respostas
  • Você não pode enviar anexos
  • Você não pode editar suas mensagens
  •