Skip to main content

Two new supply-chain attacks come to light in less than a week


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

As drive-by attacks get harder, hackers exploit the trust we have in software providers.

 
Dan Goodin - 10/23/2018
 
Most of us don’t think twice about installing software or updates from a trusted developer. We scrutinize the source site carefully to make sure it’s legitimate, and then we let the code run on our computers without much more thought. As developers continue to make software and webpages harder to hack, blackhats over the past few years have increasingly exploited this trust to spread malicious wares. Over the past week, two such supply-chain attacks have come to light.
 
The first involves VestaCP, a control-panel interface that system administrators use to manage servers. This Internet scan performed by Censys shows that there are more than 132,000 unexpired TLS certificates protecting VestaCP users at the moment. According to a post published last Thursday by security firm Eset, unknown attackers compromised VestaCP servers and used their access to make a malicious change to an installer that was available for download.
 
Full Article.

0 replies

Be the first to reply!

Reply