Patch release addresses flaw linked to several compromises, as well as malware distribution and phishing campaigns, on other sites Joomla has released a patch that addresses a critical vulnerability in their blogging and CMS platform, which if exploited allows an attacker the ability to bypass file-type upload restrictions. The flaw has been linked to several site compromises, as well as malware distribution and phishing campaigns.Right around the time researchers were following the chaos created by the Fort Disco botnet, Joomla (one of the largest blogging platforms on the Web) patched a completely separate flaw, which placed millions of websites at risk.The problem was disclosed to them by Versafe, an Israeli security firm that focuses on Web-based threats and malware, after they noticed a sharp increase in the number of phishing and malware-based attacks targeting their customers.“What brought this vulnerability to our attention was that we noticed a sharp increase in the number of phishing and malware attacks being hosted from legitimate Joomla-based sites,” said Eyal Gruner, CEO of Versafe. “The series of attacks exploiting this vulnerability were particularly aggressive and widespread,” he added.Further, Gruner said that more than 50 percent of the attacks targeting their customers in the Europe, the Middle East and Africa region (EMEA) leveraged the recently patched flaw, and “were successful in infecting a great many unsuspecting visitors to genuine websites.” As mentioned last week, Arbor Networks, as well as other security firms, have been tracking a botnet called Fort Disco. The campaign is actually launched client-side and targets Joomla and WordPress installations protected by weak passwords. The attacks are believed to be ongoing, and an investigation by CSO uncovered a hit-list of more than 400,000 domains.The campaign uncovered by Versafe is different, but serves as another example of criminals targeting vulnerable platforms in order to leverage the legitimacy of a given domain.Earlier this month, Trend Micro discussed the existence of the Stealrat botnet, which pushes spam and malware by compromising domains running WordPress and Joomla. According to Trend, more than 195,000 domains have been compromised as part of this attack.The flaw patched by Joomla, which impacts all installations prior to versions 3.1.5 and 2.5.14, deals with the platform’s media manager, and an attacker’s ability to upload restricted files.For example, normally malicious_shell.php would be blocked, but if the attacker attempted to upload malicious_shell.php. — adding a period to the end of the filename itself, Joomla failed prevent this from happening.As a result, the compromised domains were used to host the Blackhole Exploit Kit, as well as push Phishing attacks in order to draw traffic to the domain. According to Versafe, the attackers used IP addresses from China, and automated much of the process using bots. Given that the vulnerability impacts the entire install-base, the number of abandoned installations online mean that webhosts and small businesses are at risk if they havent disabled the domain hosting unpatched installations. With that in mind, Joomla has flagged this patch as critical and is urging users to upgrade to the latest version as soon as possible. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe