PHP.net maintainers to reset user passwords, change SSL certificate

The compromise extended to two servers, the PHP Group said

The PHP Group will reset the passwords for accounts on php.net, the official website of the PHP programming language, and will change the site's SSL certificate after attackers compromised two servers and injected malicious code into the website.

The security breach was confirmed Thursday after earlier in the day the Google Safe Browsing service blacklisted the site for distributing malware ,which caused Mozilla Firefox and Google Chrome to block users from visiting it.

The PHP Group initially thought the warnings were the result of a false positive detection, but a more thorough investigation revealed that attackers managed to inject malicious JavaScript code into one of the site's files called userprefs.js. That code executed exploits from a third-party website that, if successful, installed a piece of malware on visitors' computers.

The PHP Group's investigation, which is still in progress, revealed that the compromise extended to two servers: the server that hosted the www.php.net, static.php.net and git.php.net domains and the server that hosted bugs.php.net, the project's bug tracking system.

There is no evidence that the PHP distribution packages or the Git repository used for source code management have been compromised.

"All affected services have been migrated off those servers," the PHP Group said in a status update. "We have verified that our Git repository was not compromised, and it remains in read only mode as services are brought back up in full."

The method used by attackers to compromise the two servers and inject rogue code into userprefs.js has yet to be determined.

Php.net users who contribute to different projects hosted on svn.php.net or git.php.net will have their passwords reset, the PHP Group said.

In addition, the SSL certificate used on several php.net websites has been revoked, because it's possible that attackers might have gained access to the certificate's private key.

"We are in the process of getting a new certificate, and expect to restore access to php.net sites that require SSL (including bugs.php.net and wiki.php.net) in the next few hours," the PHP Group said.

Users who visited the affected php.net websites between Oct. 22 and Oct. 24 should scan their computers for malware.

The malicious code was only intermittently served to users during that time because an existing synchronization process was periodically reverting the userprefs.js to its original clean state. As a result, not all visitors were affected, but it's hard to know which ones were.

According to security researchers from Alien Vault, the malicious code on php.net loaded an instance of the Magnitude exploit kit hosted on a different website. Exploit kits are Web-based attack tools that exploit vulnerabilities in browser plug-ins to infect computers with malware.

Php.net attack traffic captured by researchers from Barracuda Networks on Tuesday contained a Flash Player exploit, but according to researchers from Trustwave an exploit for the CVE-2013-2551 vulnerability, which affects Internet Explorer versions 6 to 10, was also used. This vulnerability was patched by Microsoft in May.

Kaspersky Lab senior security researcher Fabio Assolini said on Twitter that if successful, the exploits installed a Trojan program called Tepfer.

The Tepfer malware is designed to steal log-in credentials and configuration information from FTP client software, according to an August analysis by researchers from Fortinet.

Many users who visit the php.net website are Web developers and they are likely to store FTP log-in credentials on their computers for the websites they maintain. Users who believe they might have been compromised as a result of this attack should probably change the log-in credentials stored in their FTP clients.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags online safetyFortinetThe PHP GroupAlien VaultspywareExploits / vulnerabilitieskaspersky labmalwareintrusiontrustwavesecurityBarracuda NetworksAccess control and authentication

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?