That Drupal bug you were told to patch weeks ago? Cryptominers hope you haven't bothered

Cryptocoin malware outfit takes aim at 'Drupalgeddon' bug


A set of high-severity vulnerabilities in Drupal that were disclosed last month are now the target of widespread attacks by a malware campaign.

Researcher Troy Mursch of Bad Packets Report has spotted hundreds of compromised Drupal sites being used to host "cryptojacking" malware that uses the CPUs of visitors to mine cryptocurrency via CoinHive.

casino_security_648

Patch Drupal now: Yet another critical website bug found – a sequel to 'Drupalgeddon2'

READ MORE

Mursch says the sites all appear to have been compromised via their Drupal CMS software, all of which were outdated and vulnerable to the 'Drupalgeddon2' remote code execution flaws.

While the first compromised pages were spotted on the websites of the San Diego Zoo and the Chihuahua, Mexico government site, the researcher quickly found the attack to be far more widespread.

"After I analysed the IoCs, I was able to locate over 300 additional websites in this cryptojacking campaign," Mursch wrote. "Many discovered were government and university sites from all over the world."

In total Mursch said, around 348 individual sites had been compromised by this specific malware operation.

The attackers were able to exploit the flaws and inject code into individual pages that would then run mining code whenever a visitor loads the page.

"This is yet another case of miscreants compromising outdated and vulnerable Drupal installations on a large scale," writes Mursch. "If you’re a website operator using Drupal’s content management system, you need to update to the latest available version ASAP."

It's not exactly a new revelation that attackers target-high-profile vulnerabilities in the wild. Since the Drupal bugs were first revealed in April along with their patches, experts have been advising administrators to make sure they have tested and applied the fixes as soon as possible.

That the attackers were able to infect hundreds of sites, many run by governments and educational institutions, shows how potentially widespread the vulnerability appears to be amongst high-value targets.

It should also be yet another reminder to any admins dragging their feet on checking their Drupal installations for the bug: the bug is being actively exploited in the wild, the time to patch is now. More accurately, the time was about three weeks ago. ®


Other stories you might like

  • Clipminer rakes in $1.7m in crypto hijacking scam
    Crooks divert transactions to own wallets while running mining on the side

    A crew using malware that performs cryptomining and clipboard-hacking operations have made off with at least $1.7 million in stolen cryptocurrency.

    The malware, dubbed Trojan.Clipminer, leverages the compute power of compromised systems to mine for cryptocurrency as well as identify crypto-wallet addresses in clipboard text and replace it to redirect transactions, according to researchers with Symantec's Threat Intelligence Team.

    The first samples of the Windows malware appeared in January 2021 and began to accelerate in their spread the following month, the Symantec researchers wrote in a blog post this week. They also observed that there are several design similarities between Clipminer and KryptoCibule – another cryptomining trojan that, a few months before Clipminer hit the scene, was detected and written about by ESET analysts.

    Continue reading
  • Even Russia's Evil Corp now favors software-as-a-service
    Albeit to avoid US sanctions hitting it in the wallet

    The Russian-based Evil Corp is jumping from one malware strain to another in hopes of evading sanctions placed on it by the US government in 2019.

    You might be wondering why cyberextortionists in the Land of Putin give a bit flip about US sanctions: as we understand it, the sanctions mean anyone doing business with or handling transactions for gang will face the wrath of Uncle Sam. Evil Corp is therefore radioactive, few will want to interact with it, and the group has to shift its appearance and operations to keep its income flowing.

    As such, Evil Corp – which made its bones targeting the financial sector with the Dridex malware it developed – is now using off-the-shelf ransomware, most recently the LockBit ransomware-as-a-service, to cover its tracks and make it easier to get the ransoms they demand from victims paid, according to a report this week out of Mandiant.

    Continue reading
  • Emotet malware gang re-emerges with Chrome-based credit card heistware
    Crimeware groups are re-inventing themselves

    The criminals behind the Emotet botnet – which rose to fame as a banking trojan before evolving into spamming and malware delivery – are now using it to target credit card information stored in the Chrome web browser.

    Once the data – including the user's name, the card's numbers and expiration information – is exfiltrated, the malware will send it to command-and-control (C2) servers that are different than the one that the card stealer module uses, according to researchers with cybersecurity vendor Proofpoint's Threat Insight team.

    The new card information module is the latest illustration of Emotet's Lazarus-like return. It's been more than a year since Europol and law enforcement from countries including the United States, the UK and Ukraine tore down the Emotet actors' infrastructure in January 2021 and – they hoped – put the malware threat to rest.

    Continue reading

Biting the hand that feeds IT © 1998–2022