Hackers Attacked Ghost Blogging Platform and LineageOS Servers Using Salt Vulnerabilities

Hackers Attacked Ghost Platform

According to the development team of the Ghost blogging platform, piratas informáticos attacked it using the Authentication bypass vulnerabilities (CVE-2020-11651) and directory bypass (CVE-2020-11652) vulnerabilities in Salt in order to gain control over the main server.

Currently underway is a large-scale malicious campaign, during which were hacked systems of various companies. Cybercriminals actively scan the Network for servers with Salt software installed, used to manage and automate servers inside data centers, cloud server clusters, and corporate networks.

“Although the criminals had access to the Ghost (Pro) sites and Ghost.org billing services, they did not steal financial information or user credentials. En cambio, they downloaded a cryptocurrency miner”, – inform Ghost developers.

The mining attempt caused a load of processors and overloaded most computer systems, immediately warning specialists about the problem. Ghost developers shut down all the servers, fixed the systems, and a few hours later resumed their work.

According to some experts, the attacks were most likely carried out using an automatic vulnerability scanner that detected outdated Salt servers, and then automatically exploited two vulnerabilities for installing malware.

“It is possible that the perpetrators of these attacks do not even know which companies they are currently hacking. Vulnerable Salt-servers are fixed in banks, web-hosting and Fortune 500 companies”, – said the experts.

También, having exploited vulnerabilities in the installation of the Saltstack Salt framework, hackers gained unauthorized access to the infrastructure of the LineageOS mobile operating system, created on the basis of Android and used in smartphones, tablets and set-top boxes.

According to the LineageOS team’s notificación, they discovered the hack before the attackers could do any harm.

“The source code of the operating system and its assembly, the release of which was suspended on April 30 for reasons unrelated to the hacking, was not affected. The attackers failed to gain access to the keys for signing the official versions of LineageOS, since they are stored separately from the main OS infrastructure”, – said the developers of LineageOS.

Saltstack, el desarrollador de Salt software, has already released patches for these vulnerabilities. Actualmente, researchers discovered on the Internet about 6 thousand vulnerable Salt servers.

Let me remind you that recently IS researcher descubierto a critical vulnerability in GitLab.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *