November 4, 2014 By Shane Schick 2 min read

Most people probably like to go to work under the assumption that their website wasn’t hacked, but representatives of the Drupal content management system (CMS) say those who failed to immediately patch a critical vulnerability were likely compromised.

A prepared statement on Drupal.org details the nature of the vulnerability, which takes the form of a SQL injection flaw that allows automated attacks to hit sites that use the CMS. The vulnerability was discovered in mid-October, and though a patch was released, attackers likely targeted sites in less than eight hours, Threatpost reported.

Ironically, the CVE-2014-3704 vulnerability was specifically intended to thwart SQL injection attacks, in which malicious software code is used to gain access to a database. CSO Online said attackers were able to take advantage of unpatched Drupal sites to steal information and even take them over entirely. Like Heartbleed, which affected untold numbers of websites around the world, Drupal is largely looked over by a team of about 40 volunteers, CSO Online noted. This lack of resources may explain why the issue was initially disclosed in a public bug-tracking report from last year.

The potential impact of attacks on Drupal websites could be wide-ranging. The Web Host Industry Review noted an estimated 24 percent of .gov websites use the CMS, but it has been adopted far beyond the public sector as well. At this point, experts are suggesting that upgrading to Version 7.3 or applying the patch will not be enough and that users should assume their site has been infiltrated.

Instead, ZDNet and others shared an eight-point response plan that website administrators should pursue. The steps included taking sites offline and replacing them with a temporary HTML page, moving to a new server or removing files from the old server for analysis and restoring to backup versions of the site from before Oct. 14, 2014.

This last point is hugely important because, as PCWorld and others reported, attackers may have tried to cover their tracks by first compromising Drupal sites and then applying the patch themselves to prevent others from breaking in. In other words, even if a site looks like it’s already safe, it’s probably not.

If the site is hosted by a third party, administrators of other websites managed by the same service provider should also be notified. In fact, eWEEK interviewed sources that suggested it was service providers who played a key role in revealing the extent of the danger and recording details about some of the first attacks.

Image Source: Flickr

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today