Menu
PHP.net maintainers to reset user passwords, change SSL certificate

PHP.net maintainers to reset user passwords, change SSL certificate

The compromise extended to two servers, the PHP Group said

The PHP Group will reset the passwords for accounts on php.net, the official website of the PHP programming language, and will change the site's SSL certificate after attackers compromised two servers and injected malicious code into the website.

The security breach was confirmed Thursday after earlier in the day the Google Safe Browsing service blacklisted the site for distributing malware ,which caused Mozilla Firefox and Google Chrome to block users from visiting it.

The PHP Group initially thought the warnings were the result of a false positive detection, but a more thorough investigation revealed that attackers managed to inject malicious JavaScript code into one of the site's files called userprefs.js. That code executed exploits from a third-party website that, if successful, installed a piece of malware on visitors' computers.

The PHP Group's investigation, which is still in progress, revealed that the compromise extended to two servers: the server that hosted the www.php.net, static.php.net and git.php.net domains and the server that hosted bugs.php.net, the project's bug tracking system.

There is no evidence that the PHP distribution packages or the Git repository used for source code management have been compromised.

"All affected services have been migrated off those servers," the PHP Group said in a status update. "We have verified that our Git repository was not compromised, and it remains in read only mode as services are brought back up in full."

The method used by attackers to compromise the two servers and inject rogue code into userprefs.js has yet to be determined.

Php.net users who contribute to different projects hosted on svn.php.net or git.php.net will have their passwords reset, the PHP Group said.

In addition, the SSL certificate used on several php.net websites has been revoked, because it's possible that attackers might have gained access to the certificate's private key.

"We are in the process of getting a new certificate, and expect to restore access to php.net sites that require SSL (including bugs.php.net and wiki.php.net) in the next few hours," the PHP Group said.

Users who visited the affected php.net websites between Oct. 22 and Oct. 24 should scan their computers for malware.

The malicious code was only intermittently served to users during that time because an existing synchronization process was periodically reverting the userprefs.js to its original clean state. As a result, not all visitors were affected, but it's hard to know which ones were.

According to security researchers from Alien Vault, the malicious code on php.net loaded an instance of the Magnitude exploit kit hosted on a different website. Exploit kits are Web-based attack tools that exploit vulnerabilities in browser plug-ins to infect computers with malware.

Php.net attack traffic captured by researchers from Barracuda Networks on Tuesday contained a Flash Player exploit, but according to researchers from Trustwave an exploit for the CVE-2013-2551 vulnerability, which affects Internet Explorer versions 6 to 10, was also used. This vulnerability was patched by Microsoft in May.

Kaspersky Lab senior security researcher Fabio Assolini said on Twitter that if successful, the exploits installed a Trojan program called Tepfer.

The Tepfer malware is designed to steal log-in credentials and configuration information from FTP client software, according to an August analysis by researchers from Fortinet.

Many users who visit the php.net website are Web developers and they are likely to store FTP log-in credentials on their computers for the websites they maintain. Users who believe they might have been compromised as a result of this attack should probably change the log-in credentials stored in their FTP clients.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwarespywareFortinetonline safetyintrusiontrustwavekaspersky labAccess control and authenticationExploits / vulnerabilitiesBarracuda NetworksThe PHP GroupAlien Vault

Featured

Slideshows

Reseller News Platinum Club celebrates leading partners in 2019

Reseller News Platinum Club celebrates leading partners in 2019

The leading players of the New Zealand channel came together to celebrate a year of achievement at the annual Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months.

Reseller News Platinum Club celebrates leading partners in 2019
Reseller News hosts alumnae breakfast for Women in ICT Awards

Reseller News hosts alumnae breakfast for Women in ICT Awards

Reseller News hosted its second annual alumnae breakfast for the Women in ICT Awards in New Zealand, designed to showcase the leading female leaders in the industry. Held at The Cordis in Auckland, attendees came together to hear inspiring keynotes and panel discussions, alongside high-level networking among peers. Photos by Gino Demeer.

Reseller News hosts alumnae breakfast for Women in ICT Awards
Reseller News Innovation Awards 2019: meet the winners

Reseller News Innovation Awards 2019: meet the winners

Reseller News honoured the standout players of the New Zealand channel in front of more than 480 technology leaders in Auckland on 23 October, recognising the achievements of top partners, emerging entrants and innovative start-ups.

Reseller News Innovation Awards 2019: meet the winners
Show Comments