Incidents

Sites using AWStats are being targeted

We are seeing vast numbers of sites being compromised at the moment.

These sites are using an older version of AWStats, which is a free tool that generates advanced graphical statistics for web, ftp or mail servers.

There is a vulnerability in AWStats 6.2 and previous versions which leads to remote command execution. This gives an attacker almost full control over the server.

This vulnerability was first disclosed on 17th January 2005. It has been fixed in AWStats 6.3, so we urge everybody who is using AWStats to make sure they are using 6.3.

Although we are seeing mostly defacements, you are highly recommended to thoroughly check your servers if you have been running AWStats 6.1 since 17th January.

Sites using AWStats are being targeted

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Reports

Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs

Kaspersky GReAT experts dive deep into the BlueNoroff APT’s GhostCall and GhostHire campaigns. Extensive research detailing multiple malware chains targeting macOS, including a stealer suite, fake Zoom and Microsoft Teams clients and ChatGPT-enhanced images.

Mem3nt0 mori – The Hacking Team is back!

Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.

Mysterious Elephant: a growing threat

Kaspersky GReAT experts describe the latest Mysterious Elephant APT activity. The threat actor exfiltrates data related to WhatsApp and employs tools such as BabShell and MemLoader HidenDesk.