Open source web hosting software compromised with DDoS malware
#1
Quote:The provider of an open-source hosting panel software admitted yesterday to a security breach during which an unknown hacker contaminated the project's source code with malware that logs passwords, open shells, and can launch DDoS attacks.
"Our infrastructure server was hacked," said a member of the Vesta Control Panel (VestaCP) team yesterday in a forum post. "The hackers then changed all installation scripts to log admin password and [server IP]."

The code permitted attackers to collect admin passwords for servers where the Vesta control panel was installed. To avoid making the traffic from compromised servers look suspicious, the attackers sent passwords back to an official VestaCP domain that they presumably still had control over. Attackers then used these passwords to access compromised servers and install a new malware strain named Linux/ChachaDDoS --broken down in this ESET report released today.

Source: https://www.zdnet.com/article/open-sourc...s-malware/
[-] The following 1 user says Thank You to silversurfer for this post:
  â€˘ harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Microsoft Confirms Windows 11 24H2/25H2 ...
Microsoft has offici...schreckdeividas — 08:52
AntGROUP Inc. / VCap-developer
Ant Download Manager...jasonX — 05:33
Brave 1.88.132 (Chromium 146.0.7680.80)
Release v1.88.132 ...harlan4096 — 17:56
Windows 7 Gets a Modern Makeover in New ...
A new concept vide...harlan4096 — 17:55
Microsoft Releases Emergency Windows 11 ...
Microsoft has rele...harlan4096 — 17:53

[-]
Birthdays
Today's Birthdays
avatar (38)francisnj3
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (38)Charlesfibre
avatar (43)artmaGoork

[-]
Online Staff
There are no staff members currently online.

>