{"id":12337,"date":"2018-05-18T08:10:05","date_gmt":"2018-05-18T16:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/05\/18\/news-6106\/"},"modified":"2018-05-18T08:10:05","modified_gmt":"2018-05-18T16:10:05","slug":"news-6106","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/18\/news-6106\/","title":{"rendered":"A look into Drupalgeddon&#8217;s client-side attacks"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 18 May 2018 15:00:00 +0000<\/strong><\/p>\n<p>Drupal is one of the most popular Content Management Systems (CMS), along with WordPress and Joomla. In late March 2018, Drupal was affected by a major remote code execution vulnerability (<a href=\"https:\/\/www.drupal.org\/sa-core-2018-002\" target=\"_blank\" rel=\"noopener\">CVE-2018-7600<\/a>) followed by yet another (<a href=\"https:\/\/www.drupal.org\/sa-core-2018-004\" target=\"_blank\" rel=\"noopener\">CVE-2018-7602<\/a>) almost a month later, both aptly nicknamed Drupalgeddon 2 and Drupalgeddon 3.<\/p>\n<p>These back-to-back vulnerabilities were accompanied by proof of concepts that translated into almost immediate real-world attacks. For many website owners, this situation was frustrating because the window of time to patch is getting considerably smaller. Additionally, updating or upgrading Drupal (or any other CMS for that matter) may have side effects, such as broken templates or functionality, which is why you need to make a full back up and test the changes in the staging environment before moving to production.<\/p>\n<p>Rolling out a CMS is usually the easy part. Maintaining it is where most problems occur due to lack of knowledge, fear of breaking something, and, of course, costs. While this is an earned responsibility for each site owner to do due diligence with their web properties, the outcome is typically websites being severely out of date and exploited, often more than once.<\/p>\n<h3>Sample set and web crawl<\/h3>\n<p>We decided to choose a number web properties that had not yet been validated (including all versions of Drupal, vulnerable or not). Our main source of URLs came from <a href=\"https:\/\/www.shodan.io\/\" target=\"_blank\" rel=\"noopener\">Shodan<\/a> and was complemented by <a href=\"https:\/\/publicwww.com\/\" target=\"_blank\" rel=\"noopener\">PublicWWW<\/a>, for a total of roughly 80,000 URLs to crawl. We were surprised to start hitting compromised sites quickly into the process and were able to confirm over 900 injected web properties.<\/p>\n<p>Many of the results were servers hosted on Amazon or other cloud providers that were most likely set up for testing purposes (staging) and never removed or upgraded. Thankfully, they received little to no traffic. The other domains we encountered spanned a variety of verticals and languages, with one common denominator: an outdated version (usually severely outdated) of the Drupal CMS.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Crawl.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23778\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/crawl\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Crawl.png\" data-orig-size=\"826,561\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Crawl\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Crawl-300x204.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Crawl-600x408.png\" class=\"size-full wp-image-23778 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Crawl.png\" alt=\"\" width=\"826\" height=\"561\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Crawl.png 826w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Crawl-300x204.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Crawl-600x408.png 600w\" sizes=\"auto, (max-width: 826px) 100vw, 826px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 1: Crawling and flagging compromised Drupal sites using Fiddler<\/em><\/p>\n<h3>Drupal versions<\/h3>\n<p>At the time of this writing, there are two <a href=\"https:\/\/www.drupal.org\/project\/drupal\">recommended releases<\/a> for Drupal. Version 8.x.x is the latest and greatest with some new features, while 7.x.x is considered the most stable and compatible version, especially when it comes to themes.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/releases_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23780\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/releases_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/releases_.png\" data-orig-size=\"620,237\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"releases_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/releases_-300x115.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/releases_-600x229.png\" class=\"size-full wp-image-23780 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/releases_.png\" alt=\"\" width=\"620\" height=\"237\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/releases_.png 620w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/releases_-300x115.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/releases_-600x229.png 600w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 2: Drupal&#8217;s two main supported branches<\/em><\/p>\n<p>Almost half the sites we flagged as compromised were running Drupal version 7.5.x, while version 7.3.x still represented about 30 percent, a fairly high number considering it was last updated in <a href=\"https:\/\/www.drupal.org\/project\/drupal\/releases\/7.39\" target=\"_blank\" rel=\"noopener\">August 2015<\/a>. Many security flaws have been discovered (and exploited) since then.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats1.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23797\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/stats1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats1.png\" data-orig-size=\"598,427\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"stats1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats1-300x214.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats1.png\" class=\"size-full wp-image-23797 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats1.png\" alt=\"\" width=\"598\" height=\"427\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats1.png 598w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats1-300x214.png 300w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 3: Percentage of compromised sites belonging to a particular Drupal version<\/em><\/p>\n<h3>Payloads<\/h3>\n<p>A large number of Drupal sites that have been hacked via these two recent exploits were also infected with server-side malware, in particular with <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Drupal+CVE20187600+PoC+is+Public\/23549\/\" target=\"_blank\" rel=\"noopener\">XMRig cryptocurrency miners<\/a>. However, in this post we will focus on the client-side effects of those compromises. Neither are exclusive though, and one should expect that a hacked site could be performing malicious actions on both server and client side.<\/p>\n<p>Unsurprisingly, web miners were by far the most common type of injection we noticed. But we also came across a few different social engineering campaigns.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats2.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23798\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/stats2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats2.png\" data-orig-size=\"598,426\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"stats2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats2-300x214.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats2.png\" class=\"size-full wp-image-23798 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats2.png\" alt=\"\" width=\"598\" height=\"426\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats2.png 598w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/stats2-300x214.png 300w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 4: Breakdown of the most common payloads<\/em><\/p>\n<h4>Web miners<\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon\/\" target=\"_blank\" rel=\"noopener\">Drive-by mining attacks<\/a> went though the roof in the fall of 2017 but slowed down somewhat at the beginning of the year. It&#8217;s safe to say that the recent Drupal vulnerabilities have added fuel to the fire and resulted in increased activity. Coinhive injections remain by far the most popular choice, although public or private Monero pools are gaining traction as well.<\/p>\n<p>We are seeing the same campaign that was <a href=\"https:\/\/badpackets.net\/large-cryptojacking-campaign-targeting-vulnerable-drupal-websites\/\" target=\"_blank\" rel=\"noopener\">already documented<\/a> by other researchers in early March and is ensnaring more victims by the day.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/coinhive_uni.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23784\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/coinhive_uni\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/coinhive_uni.png\" data-orig-size=\"1035,721\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"coinhive_uni\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/coinhive_uni-300x209.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/coinhive_uni-600x418.png\" class=\"size-full wp-image-23784 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/coinhive_uni.png\" alt=\"\" width=\"1035\" height=\"721\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/coinhive_uni.png 1035w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/coinhive_uni-300x209.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/coinhive_uni-600x418.png 600w\" sizes=\"auto, (max-width: 1035px) 100vw, 1035px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 5: A subdomain of Harvard University&#8217;s main site mining Monero<\/em><\/p>\n<h4>Fake updates<\/h4>\n<p>This campaign of fake browser updates we <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/\" target=\"_blank\" rel=\"noopener\">documented earlier<\/a> is still going strong. It distributes a password stealer of Remote Administration Tool (RAT).<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/FakeUpdates.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23785\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/fakeupdates\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/FakeUpdates.png\" data-orig-size=\"1036,871\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"FakeUpdates\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/FakeUpdates-300x252.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/FakeUpdates-600x504.png\" class=\"size-full wp-image-23785 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/FakeUpdates.png\" alt=\"\" width=\"1036\" height=\"871\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/FakeUpdates.png 1036w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/FakeUpdates-300x252.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/FakeUpdates-600x504.png 600w\" sizes=\"auto, (max-width: 1036px) 100vw, 1036px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 6:\u00a0 A compromised Drupal site pushing a fake Chrome update<\/em><\/p>\n<h4>Tech support scams (browlocks)<\/h4>\n<p>Redirections to browser locker pages\u2014a typical approach for unveiling tech support scams. The most common redirection we were able to document involved an intermediary site redirecting to browser locker pages using the .TK Top Level Domain (TLD) name.<\/p>\n<pre>mysimplename[.]com\/si.php  window.location.replace(\"http:\/\/hispaintinghad[.]tk\/index\/?1641501770611\");  window.location.href = \"http:\/\/hispaintinghad[.]tk\/index\/?1641501770611\";<\/pre>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/TSS_redirection.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23786\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/tss_redirection\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/TSS_redirection.png\" data-orig-size=\"1036,873\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"TSS_redirection\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/TSS_redirection-300x253.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/TSS_redirection-600x506.png\" class=\"size-full wp-image-23786 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/TSS_redirection.png\" alt=\"\" width=\"1036\" height=\"873\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/TSS_redirection.png 1036w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/TSS_redirection-300x253.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/TSS_redirection-600x506.png 600w\" sizes=\"auto, (max-width: 1036px) 100vw, 1036px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 7: A compromised Drupal host redirecting to a browser locker page<\/em><\/p>\n<p style=\"text-align: center\">\n<h3>Web miners and injected code<\/h3>\n<p>We collected different types of code injection, from simple and clear text to long obfuscated blurbs. It\u2019s worth noting that in many cases the code is dynamic\u2014most likely a technique to evade detection.<\/p>\n<p><a title=\"\" href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/miner_injections.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23812\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/miner_injections\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/miner_injections.png\" data-orig-size=\"1097,604\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"miner_injections\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/miner_injections-300x165.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/miner_injections-600x330.png\" class=\"size-full wp-image-23812 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/miner_injections.png\" alt=\"\" width=\"1097\" height=\"604\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/miner_injections.png 1097w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/miner_injections-300x165.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/miner_injections-600x330.png 600w\" sizes=\"auto, (max-width: 1097px) 100vw, 1097px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 8: Collage of some of the most common miner injections<\/em><\/p>\n<h3>Snapshots<\/h3>\n<p>The following are some examples of compromised sites sorted by category. We have contacted all affected parties to let them know their resources are being used by criminals to generate profit from malicious cryptomining or malware infections.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/uni1.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23775\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/uni1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/uni1.png\" data-orig-size=\"1043,819\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"uni1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/uni1-300x236.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/uni1-600x471.png\" class=\"size-full wp-image-23775 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/uni1.png\" alt=\"\" width=\"1043\" height=\"819\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/uni1.png 1043w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/uni1-300x236.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/uni1-600x471.png 600w\" sizes=\"auto, (max-width: 1043px) 100vw, 1043px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 9: Education (University of Southern California)<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/gov1.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23772\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/gov1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/gov1.png\" data-orig-size=\"1047,700\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"gov1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/gov1-300x201.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/gov1-600x401.png\" class=\"size-full wp-image-23772 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/gov1.png\" alt=\"\" width=\"1047\" height=\"700\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/gov1.png 1047w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/gov1-300x201.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/gov1-600x401.png 600w\" sizes=\"auto, (max-width: 1047px) 100vw, 1047px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 10: Government (Arkansas Courts &amp; Community Initiative)<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/political.png\" data-rel=\"lightbox-10\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23773\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/political\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/political.png\" data-orig-size=\"1044,700\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"political\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/political-300x201.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/political-600x402.png\" class=\"size-full wp-image-23773 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/political.png\" alt=\"\" width=\"1044\" height=\"700\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/political.png 1044w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/political-300x201.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/political-600x402.png 600w\" sizes=\"auto, (max-width: 1044px) 100vw, 1044px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 11: Political party (Green Party of California)<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/reviveadserver.png\" data-rel=\"lightbox-11\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23774\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/reviveadserver\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/reviveadserver.png\" data-orig-size=\"1039,817\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"reviveadserver\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/reviveadserver-300x236.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/reviveadserver-600x472.png\" class=\"size-full wp-image-23774 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/reviveadserver.png\" alt=\"\" width=\"1039\" height=\"817\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/reviveadserver.png 1039w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/reviveadserver-300x236.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/reviveadserver-600x472.png 600w\" sizes=\"auto, (max-width: 1039px) 100vw, 1039px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 12: Ad server (Indian TV Revive Ad server)<\/em><\/p>\n<p><a title=\"\" href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/religious.png\" data-rel=\"lightbox-12\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23802\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/religious\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/religious.png\" data-orig-size=\"1052,722\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"religious\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/religious-300x206.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/religious-600x412.png\" class=\"size-full wp-image-23802 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/religious.png\" alt=\"\" width=\"1052\" height=\"722\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/religious.png 1052w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/religious-300x206.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/religious-600x412.png 600w\" sizes=\"auto, (max-width: 1052px) 100vw, 1052px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 13: Religion (New Holly Light)<\/em><\/p>\n<p><a title=\"\" href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/health_.png\" data-rel=\"lightbox-13\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23803\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/health_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/health_.png\" data-orig-size=\"1051,723\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"health_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/health_-300x206.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/health_-600x413.png\" class=\"size-full wp-image-23803 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/health_.png\" alt=\"\" width=\"1051\" height=\"723\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/health_.png 1051w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/health_-300x206.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/health_-600x413.png 600w\" sizes=\"auto, (max-width: 1051px) 100vw, 1051px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 14: Health (NetApp Benefits)<\/em><\/p>\n<p><a title=\"\" href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/conf.png\" data-rel=\"lightbox-14\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23810\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/conf\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/conf.png\" data-orig-size=\"1050,723\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"conf\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/conf-300x207.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/conf-600x413.png\" class=\"size-full wp-image-23810 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/conf.png\" alt=\"\" width=\"1050\" height=\"723\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/conf.png 1050w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/conf-300x207.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/conf-600x413.png 600w\" sizes=\"auto, (max-width: 1050px) 100vw, 1050px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 15: Conferences (Red Hat partner conference)\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/tech.png\" data-rel=\"lightbox-15\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23813\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/attachment\/tech\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/tech.png\" data-orig-size=\"1048,722\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"tech\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/tech-300x207.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/tech-600x413.png\" class=\"size-full wp-image-23813 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/tech.png\" alt=\"\" width=\"1048\" height=\"722\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/tech.png 1048w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/tech-300x207.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/tech-600x413.png 600w\" sizes=\"auto, (max-width: 1048px) 100vw, 1048px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 16: Tech (ComputerWorld&#8217;s Brazilian portal)<\/em><\/p>\n<h3>Malicious cryptomining remains hot<\/h3>\n<p>It is clear that right now, cryptomining is the preferred kind of malicious injection. There are many public but also private APIs that make the whole process easy, and unfortunately they are being abused by bad actors.<\/p>\n<p>Compromised sites big and small remain a hot commodity that attackers will try to amass over time. And because patching remains an issue, the number of potential new victims never stops growing. In light of this, website owners should look into other kinds of mitigation when patching is not always an immediate option, and check what some people call virtual patching. In particular, Web Application Firewalls (WAFs) have helped many stay protected even against new types of attacks, and even when their CMS was vulnerable.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> continues to detect and block malicious cryptomining and other unwanted redirections.<\/p>\n<h3>Indicators of compromise<\/h3>\n<p><strong>Coinhive<\/strong><\/p>\n<p>-&gt; URIs<\/p>\n<pre>cnhv[.]co\/1nt9z  coinhive[.]com\/lib\/coinhive.min.js  coinhive[.]com\/lib\/cryptonight.wasm  coinhive[.]com\/lib\/worker-asmjs.min.js?v7  ws[0-9]{3}.coinhive[.]com\/proxy<\/pre>\n<p>-&gt; Site keys<\/p>\n<pre>CmGKP05v2VJbvj33wzTIayOv6YGLkUYN  f0y6O5ddrXo1be4NGZubP1yHDaWqyflD  kAdhxvdilslXbzLAEjFQDAZotIVm5Jkf  MKr3Uf5CaT88pcqzAXltkBu4Us5gHWaj  NL9TTsyGeVU8FbKR9fUvwkwU4qPJ4Z2I  no2z8X4wsiouyTmA9xZ0TyUdegWBw2yK  oHaQn8uDJ16fNhcTU7y832cv49PqEvOS  PbNDLKIHLCM0hNXOIM7sRTsk66ZuAamf  RYeWLxbPVlfPNsZUh231aLXoYAdPguXY  XoWXAWvizTNnyia78qTIFfATRgcbJfGx  YaUkuGZ3pmuPVsBMDxSgY45DwuBafGA3<\/pre>\n<p><strong>Crypto-Loot<\/strong><\/p>\n<p>-&gt; URI<\/p>\n<pre>cryptaloot[.]pro\/lib\/justdoit2.js<\/pre>\n<p>-&gt; Keys<\/p>\n<pre>48427c995ba46a78b237c5f53e5fef90cd09b5f09e92  6508a11b897365897580ba68f93a5583cc3a15637212  d1ba2c966c5f54d0da15e2d881b474a5091a91f7c702<\/pre>\n<p><strong>EthPocket<\/strong><\/p>\n<pre>eth-pocket[.]com:8585  eth-pocket[.]de\/perfekt\/perfekt.js<\/pre>\n<p><strong>JSECoin<\/strong><\/p>\n<pre>jsecoin[.]com\/platform\/banner1.html?aff1564&amp;utm_content=<\/pre>\n<p><strong>DeepMiner<\/strong><\/p>\n<pre>greenindex.dynamic-dns[.]net\/jqueryeasyui.js<\/pre>\n<p><strong>Other CryptoNight-based miner<\/strong><\/p>\n<pre>cloudflane[.]com\/lib\/cryptonight.wasm<\/pre>\n<p><strong>FakeUpdates<\/strong><\/p>\n<pre>track.positiverefreshment[.]org\/s_code.js?cid=220&amp;v=24eca7c911f5e102e2ba  click.clickanalytics208[.]com\/s_code.js?cid=240&amp;v=73a55f6de3dee2a751c3  185.244.149[.]74  5.9.242[.]74<\/pre>\n<p><strong>Tech scams<\/strong><\/p>\n<pre>192.34.61[.]245  192.81.216[.]165  193.201.224[.]233  198.211.107[.]153  198.211.113[.]147  206.189.236[.]91  208.68.37[.]2  addressedina[.]tk  andtakinghis[.]tk  andweepover[.]tk  asheleaned[.]tk  baserwq[.]tk  blackivory[.]tk  blownagainst[.]tk  cutoplaswe[.]tk  dearfytr[.]tk  doanythingthat[.]tk  faithlessflorizel[.]tk  grey-plumaged[.]tk  haddoneso[.]tk  handkerchiefout[.]tk  himinspectral[.]tk  hispaintinghad[.]tk  ifheisdead[.]tk  itshandupon[.]tk  iwouldsay[.]tk  leadedpanes[.]tk  millpond[.]tk  mineofcourse[.]tk  momentin[.]tk  murdercould[.]tk  mysimplename[.]com  nearlythrew[.]tk  nothinglikeit[.]tk  oncecommitted[.]tk  portraithedid[.]tk  posingfor[.]tk  secretsoflife[.]tk  sendthemany[.]tk  sputteredbeside[.]tk  steppedforward[.]tk  sweeppast[.]tk  tellingmeyears[.]tk  terriblehope[.]tk  thatwonderful[.]tk  theattractions[.]tk  thereisnodisgrace[.]tk  togetawayt[.]tk  toseethem[.]tk  wickedwere[.]tk  withaforebodingu[.]tk<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/\">A look into Drupalgeddon&#8217;s client-side attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 18 May 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/' title='A look into Drupalgeddon's client-side attacks'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Drupal_.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Back-to-back Drupal zero-day vulnerabilities are being monetized with malicious web cryptominers.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/cryptomining\/\" rel=\"category tag\">Cryptomining<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cms\/\" rel=\"tag\">CMS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/content-management-systems\/\" rel=\"tag\">content management systems<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/drupal\/\" rel=\"tag\">drupal<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/drupalgeddon\/\" rel=\"tag\">drupalgeddon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-cryptomining\/\" rel=\"tag\">malicious cryptomining<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/' title='A look into Drupalgeddon's client-side attacks'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/\">A look into Drupalgeddon&#8217;s client-side attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18462,18463,15080,18464,18465,17702,10494],"class_list":["post-12337","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cms","tag-content-management-systems","tag-cryptomining","tag-drupal","tag-drupalgeddon","tag-malicious-cryptomining","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12337"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12337\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12337"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}