We are continuing to work through the repercussions of the php.net malware issue described in a news post earlier today. As part of this, the php.net systems team have audited every server operated by php.net, and have found that two servers were compromised: the server which hosted the www.php.net, static.php.net and git.php.net domains, and was previously suspected based on the JavaScript malware, and the server hosting bugs.php.net. The method by which these servers were compromised is unknown at this time.
One of our research tools flagged php.net as distributing malware. The site appears to have been compromised and had some of its javascript altered to exploit vulnerable systems visiting the website, instead of ad network vector that we typically see in more popular sites.
В заявлении представителей php.net говорится, что веб-сайт попал в «темный список» Google и фиксировался как подозрительный сервисом safe browsing service, после чего администраторы начали расследование случая компрометации.
Вредоносное ПО, которое устанавливалось пользователям:
ссылка на оригинал статьи http://habrahabr.ru/company/eset/blog/199000/
Добавить комментарий