Attacks exploiting a critical Joomla flaw started less than four hours after the patch was released Four hours — that’s the time Joomla website owners had to apply a patch recently before attackers started to exploit the flaw it fixed. Those who still haven’t updated their websites are likely to find them compromised.On Thursday, the developers of Joomla released version 3.4.5 of the popular content management system in order to fix an SQL injection vulnerability that allows attackers to gain administrative privileges by hijacking an active administrator session.Less than four hours after the update’s release and the publishing of a technical overview by security researchers at Trustwave, attackers were already exploiting the flaw. Web security firm Sucuri said it saw attacks against two of its customers who operate very popular Joomla-based websites.“What is very scary to think is that neither of these sites were patched at the time,” Sucuri’s CTO Daniel Cid said in a blog post Monday. “The disclosure happened on a Thursday afternoon (evening in Europe), when many webmasters were already off for the day.” Within 24 hours there were already Internet-wide scans probing for the flaw and the number of attacks continued to increase over the weekend. On Monday, Sucuri recorded 12,000 exploitation attempts against the Joomla sites of its customers.Based on this incident, the administrator of an average website has a time window of less than 24 hours to patch following a serious vulnerability disclosure. If the website is a highly popular one, the reaction time should be within a few hours. These fast attack times make the use of Web application firewalls, intrusion detection systems, access control policies and proper logging increasingly important in defending Web properties. Related content feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Intrusion Detection Software Intrusion Detection Software feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe