December 16, 2015 By Larry Loeb 2 min read

On Dec. 12, security company Sucuri noted that it had seen zero-day attacks in the wild on Joomla, a popular open-source content management system (CMS). These attacks affected versions 1.5.0 through 3.4.5. The CMS presents a tempting target for cybercriminals since it has such a wide installed base. Attackers can try to insert their own backdoors into a system, for example, using the CMS as an infection vector.

Why Joomla?

“The attackers are doing an object injection via the HTTP user agent that leads to a full remote command execution,” explained Daniel Cid, founder and CTO of Sucuri, on the company’s blog.

The user agent string includes the browser type and version and the computer’s operating system and version. The flaw was caused by a lack of proper filtering when saving browser session values into the database.

In response to the discovery, Joomla issued a patch, V3.4.6, on Dec. 14 that corrected the problem for supported versions of the software. There was also a hotfix issued for the versions of Joomla that had reached their end-of-life phase, namely versions 1.5 and 2.5.

Any organization that uses Joomla will want to patch quickly since cybercriminals are moving fast to exploit any security holes. Cid said that as of Dec. 14, “the wave of attacks is even bigger, with basically every site and honeypot we have being attacked. That means that probably every other Joomla site out there is being targeted as well.”

Checking Security Posture

To indicate if you have suffered an attack, look for these three IP addresses: 74.3.170.33, 146.0.72.83 and 194.28.174.106. Sucuri found that these were the IPs that generated hundreds of exploitation requests before the patches and hotfixes were developed.

Sucuri also said that users can check if their websites have actually been compromised by searching the logs for “JDatabaseDriverMysqli” or “O:” in the User Agent. That will detect if the backdoor code has been injected.

“That’s a backdoor that executes any PHP code passed by the POST variable 111,” Cid told Threatpost. He added that Sucuri had released a technical analysis of the flaw for security experts looking to learn more about the vulnerability.

This is the second similar incident where a vulnerability was disclosed and quickly patched in Joomla. In October, cybercriminals started exploiting a SQL injection vulnerability just hours after its details were disclosed. At the time, Sucuri detected attack attempts against all the websites on its network, many of which came from the Tor anonymous network.

More from

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today