Report Cyber Crime

User database may have been leaked

PHP maintainer Nikita Popov has published an update regarding the security incident involving alleged PHP source code compromise that came to light at the end of March 2021.

On March 28, an unknown malicious actor pushed two malicious commits to the php-src repository under the names of Nikita Popov and the PHP creator Rasmus Lerdorf.

The malicious commits were disguised as benign typographical errors that needed to be corrected, however, taking a closer look at the line 370 where zend_eval_string function is called contributors noticed that the code actually adds a backdoor that allows malicious code execution on a website running the vulnerable PHP version. The malicious code is executed from within the useragent HTTP header, if the string starts with ‘zerodium’, the name of a well-known exploit seller.

Initially, the development team believed that the server hosting the repository was compromised, however, in a new message Popov said that “We no longer believe the server has been compromised. However, it is possible that the user database leaked.”

Further investigation into the incident revealed that the malicious commits were pushed using HTTPS and password-based authentication.

“Something I was not aware of at the time is that (intentionally) supported pushing changes not only via SSH (using the gitolite infrastructure and public key cryptography), but also via HTTPS. The latter did not use gitolite, and instead used git-http-backend behind Apache2 Digest authentication against the user database,” the PHP maintainer explained.

“It is notable that the attacker only makes a few guesses at usernames, and successfully authenticates once the correct username has been found. While we don’t have any specific evidence for this, a possible explanation is that the user database of has been leaked, although it is unclear why the attacker would need to guess usernames in that case,” he added., which is used for authentication and various management tasks, was running “very old code and on a very old operating system/ PHP version so some kind of vulnerability would not be terribly surprising,” Popov said.

As a security measure, the team has migrated to a new system with support for TLS 1.2 and reset all existing passwords. Additionally, passwords are now stored using bcrypt, Popov said.

Source link

Is your business effected by Cyber Crime?

If a cyber crime or cyber attack happens to you, you need to respond quickly. Cyber crime in its several formats such as online identity theft, financial fraud, stalking, bullying, hacking, e-mail fraud, email spoofing, invoice fraud, email scams, banking scam, CEO fraud. Cyber fraud can lead to major disruption and financial disasters. Contact Digitpol’s hotlines or respond to us online.

Digitpol’s Cyber Crime Investigation Unit provides investigative support to victims of cyber crimes. Digitpol is available 24/7.

Europe +31558448040
UK +44 20 8089 9944
ASIA +85239733884