Stanford University Site Hosted Malware for Months

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
...a quote from the article above:

For almost four months, script kiddies ran amok in one of Stanford's subdomains, installing web shells, mailers, and other types of web malware.

The infection was noticed last week by security researchers at Netcraft and was reported to Stanford admins, who recently cleaned their site.

The affected website belongs to the Paul F. Glenn Center for the Biology of Aging at Stanford University.

According to timestamps of the files surreptitiously uploaded to the hacked site, attackers appear to have compromised the site on January 31, 2017.


Multiple hackers broke in, used the site for phishing, spam
The hacker who initially breached the site uploaded a simplistic web shell. Once the website was compromised, other hackers seem to have flocked to the same server, like flies to a carcass.

The others that came afterward uploaded more complex web shells, and then started varying their portfolio.
 

tryfon

Level 2
Verified
May 13, 2017
76
Who knows what the students downloaded while the site was compromised...
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top