MRG Effitas hacked?

Discussion in 'malware problems & news' started by hdwydgw534, Jul 15, 2017.

  1. guest

    guest Guest

    Attached Files:

    Last edited by a moderator: Jul 15, 2017
  2. plat1098

    plat1098 Guest

    A pdf of theirs opened OK. I get the same message in Internet Explorer and Edge. That is messed up and embarrassing.
     
  3. guest

    guest Guest

    So it seems to be just a deface.
     
  4. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    Embarassing to whom ?

    You do realize that the MRG-Effitas website probably resides on a web server that is not owned nor operated by MRG Effitas - right ?
     
  5. plat1098

    plat1098 Guest

    Doesn't matter. Hope it gets straightened out soon.
     
  6. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,812
    Location:
    .
    Wasn't me ok?
    Me just one X.
    :argh:
     
  7. guest

    guest Guest

    :eek::doubt::isay::argh:
     
  8. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    98,074
    Location:
    U.S.A.
  9. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
  10. guest

    guest Guest

    Defacing, favorite sport of bored "script kiddies". :p
     
  11. Zoltan_MRG

    Zoltan_MRG Registered Member

    Joined:
    Apr 9, 2015
    Posts:
    31
    Hi All,

    I just found this thread, so let me give a quick summary of what happened. The hack started on a Saturday afternoon. When I woke up on Sunday I got notified about this as soon as I woke up and I restored the site before breakfast.

    The way we were hacked is a nice cautionary tale, so I would like to share with all of you.
    The story begins with an old vulnerable Wordpress plugin. Although this plugin was updated many times on the global Wordpress site, our Wordpress install never notified us that there is a newer version of this plugin. What is even worse is that we had 2 security plugins which alerts whenever they find old, abandoned or vulnerable plugins. None of these security plugins alerted during the ~3 year period while the vulnerable plugin was installed.

    We had one plugin based Web Application Firewall which was turned off because it blocked image/PDF upload to the site.
    We had Cloudflare WAF turned on while the hack was ongoing, Wordpress specific rules were enabled. Cloudflare did not detect or block anything.

    Following is a step-by-step description about the hack:
    1. The hacker finds the known vulnerability in the plugin and exploits it, without triggering any block in Cloudflare WAF
    2. Hacker is able to download wp-config.php, with MySQL passwords in it. From this point, every step is legitimate access, so WAF would be no use from here.
    3. Previously, phpmyadmin was not available on https://www.mrg-effitas.com/phpmyadmin/ . Our hosting provider made this available to everyone without letting us know. Hacker logs into phpmyadmin. Note to self: I still have to do something about this.
    4. This step is still a mystery, but either the hacker changed the hashed password of an admin to a password known to the hacker, or the hacker resetted one admin password and was able to access the secret for the password reset link.
    5. Hacker logs into Wordpress with admin privileges.
    6. Hacker uploads a malicious theme which gives him PHP shell access.
    7. Hacker uploads multiple backdoors to maintain access, hacker defaces index.php

    We improved our security ever since, but if multiple plugins lie to us about the security state, we are losing the battle ...
     
  12. guest

    guest Guest

    You are late to reply! (just kidding :p ) , i'm glad you gave us the full story.

    Once more it shows that attackers are keen to find unpatched vulnerabilities.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.