Mass website compromise arising from Parallels Plesk Panel vulnerabilities
Recently, a webmaster request us for assistance, he found that the website's home page or .js files were injected with some malicious code by hackers. The malicious code directs the visitor to some unknown .ru website unknowningly. These websites contain a well-known "Blackhole Exploit Kit" attack code, it attempts to attack multilple vulnerabilities in visitor's system, including: Java, Adobe Flash Player, Adobe Reader, Windows Help Center etc (Note 1). If the attack is successful, it will download the malware to the affected system. We analyzed the malicious code in the compromised website and found that it was a large scale websites compromised using the vulnerable Parallels Plesk Panel. The estimated number of affected websites was tens of thousands.
Parallels Plesk Panel vulnerabilities
Fig 1: Hackers exploit Parallels Plesk Panel vulnerabilities to steal website account password
Hackers injected the malicious code in the website of affected accounts
http:// <randomly generated domain>.ru /runforestrun?sid=cx
How to Protect
Steps for Webmasters
cd <vhost path>
grep -rl --include=*.{php,js,html,htm} "km0ae9gr6m" *
cd <vhost path>
get-childitem .\ -include *.asp,*.aspx,*.php,*.js,*.html,*.htm -rec | select-string -pattern "km0ae9gr6m"
Steps for Parallels Plesk Panel Administrators
- Apply "113321" patch (http://kb.parallels.com/113321)
- Reset all passwords (http://kb.parallels.com/en/113391),e-mail password could be considered waived
- Remove sessions records from psa database
mysql> delete from sessions;
- Remove the malicious code from the affected files in server (http://forum.parallels.com/showpost.php?p=630228&postcount=24)
Steps for Personal Users
- Install the security software and keep it updated
- Keep system software is the latest version
Share with