Hacked PostNuke Site Distributes Malicious Code
Source: Netcraft.com - Posted by Benjamin D. Thomas   
Hacks/Cracks Hackers have compromised the download server for the open source PostNuke content management system, redirecting users to malicious code in place of the .zip download of the PostNuke program. The hacked code was distributed for more than 32 hours before PostNuke site maintainers addressed the security breach. . . . Hackers have compromised the download server for the open source PostNuke content management system, redirecting users to malicious code in place of the .zip download of the PostNuke program. The hacked code was distributed for more than 32 hours before PostNuke site maintainers addressed the security breach.

PostNuke users who installed a zip archive downloaded between 11:50 pm Sunday night and 8:30 a.m. today face a grim scenario. According to a statement on the PostNuke site, all data submitted during the installation - including the server name, database credentials, admin name and password - were likely sent to the hackers. In addition, "in one file there was code allowing a malicious user to execute any shell command on the web server."

Either scenario would allow the attackers to gain control of the site where PostNuke was installed. The tar.gz download file was not affected. The tar format is traditionally used by Unix and Linux, while Zip is the leading Windows archive format.

Read this full article at Netcraft.com

Only registered users can write comments.
Please login or register.

Powered by AkoComment!