TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Analysis of yesterday's PHP.net exploit

52 pointsby martinmlover 11 years ago

4 comments

hwhover 11 years ago
Interesting! It might actually have a big impact, given how much in use the page is. And the target audience of php.net is likely to be a good target for keylogger attacks (SSH/SFTP logins and the like to development and production machines). It's certainly getting worse than I expected at first. Given how low the AV detection rate is, it would be interesting in how much impact the plugin exploits have for the overall installation base.
评论 #6611036 未加载
nwhover 11 years ago
Site is a little sluggish, here&#x27;s a render — <a href="http://i.imgur.com/IjbsN8v.jpg" rel="nofollow">http:&#x2F;&#x2F;i.imgur.com&#x2F;IjbsN8v.jpg</a>
评论 #6611516 未加载
评论 #6613336 未加载
alttagover 11 years ago
I was expecting a detailed account of how the server was compromised, although this account of the drive-by malware operating details was interesting too.
评论 #6611577 未加载
评论 #6611139 未加载
powertowerover 11 years ago
Is there any good way to tell if you&#x27;ve been compromised by this exploit?
评论 #6613577 未加载
评论 #6612206 未加载