Funny thing…

Viewing 5 posts - 1 through 5 (of 5 total)
  • Author
    Posts
  • #2216
    Lingster
    Keymaster

    A few months ago someone managed to insert a line of code into a page at Transvigor. It made me really paranoid about security, andn so I’ve been very good at installing new updates for both WordPress and phpBB. She Grew! runs on the latter.

    Then this morning:

    The newest version of the Santy Worm, Santy.e, is threatening more web sites which use PHP scripting to produce dynamically database generated pages. The Santy Worm first surfaced last week, targeting sites which use the phpBB bulletin board/forum service. Santy was using Google as its springboard to identify such phpBB powered sites. The Perl/Santy-A worm (also known as Santy) exploited a vulnerability in a piece of software often used to provide discussion forums and bulletin boards on the web, phpBB.

    I think we’re OK.

    #2217
    Anonymous
    Guest

    Is this something similar to what appears to have happened to Wreck’s message board?

    The NeverEverSanity WebWorm Generation 13 (or something?) seems to have done something evil to it.

    Anyone know anything about this at all?

    #2218
    Lingster
    Keymaster

    Is this something similar to what appears to have happened to Wreck’s message board?

    The NeverEverSanity WebWorm Generation 13 (or something?) seems to have done something evil to it.

    Anyone know anything about this at all?

    Well, if it’s a worm then it’s similar to what I’ve been cautious about. What BB is he running? Sometimes one coder will take an existing worm, trojan script or virus and then simply alter it a bit, change the name and set it loose again.

    The way these things work is that they cross-script themselves onto the server, and then they use the server to do web searches for other servers running the same application suite that the worm used to get onto the first one. In my case it’s phpBB v2. The phpBB people put out a fix in August or so, and then another in October and another a few weeks ago. The first fix was sufficient, really, but they’ve made the code pretty much airtight since then.

    #2219
    David C. Matthews
    Participant

    Hackers and virus coders must die.

    Slowly and painfully.

    And I’m not joking.

    Hate to have my first post on this board be such a downer, but there are few people I hate more in this world than these bastards who have no conscience whatsoever, whose idea of "fun" is to randomly and capriciously destroy someone else’s hard work, just because they can.

    #2220
    Lingster
    Keymaster

    Hackers and virus coders must die.

    Slowly and painfully.

    And I’m not joking.

    Hate to have my first post on this board be such a downer, but there are few people I hate more in this world than these bastards who have no conscience whatsoever, whose idea of "fun" is to randomly and capriciously destroy someone else’s hard work, just because they can.

    They’re the evolutionary process, Dave. Without these kinds of challenges, OS security and industry standards and practices wouldn’t improve, and would be vulnerable to a person with truly malicious and criminal motives.

    If you run a site, part of the responsiblity of that is making sure you follow and install updates. And updating server code isn’t always that easy – it assumes a much higher level of competence than updating run of the mill consumer software.

Viewing 5 posts - 1 through 5 (of 5 total)
  • You must be logged in to reply to this topic.