Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1059.007
(Command and Scripting Interpreter: JavaScript)
T1189
(Drive-by Compromise)
T1098
(Account Manipulation - via hijacked session privileges)
CVE Profile
Feature Abuse / N/A [CISA KEV Status: Inactive]
Telemetry
Source Script
User:Ololoshka562/test.js
External Payload Domain
hxxps://basemetrika[.]ru/s/e41
Vandalism Artifact
[[File:Woodpecker10.jpg|5000px]]
Targeted Application Files
MediaWiki:Common.js, User:<username>/common.js
Constraint
Because no endpoint binary analysis is applicable, the structure resembles a classic Cross-Site Scripting (XSS) worm (similar to the historic Samy worm), constrained entirely to the browser's Document Object Model (DOM) and session cookies.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Establish a policy review for web application administrators regarding the testing of untrusted, user-submitted code in production environments.
DETECT (DE) – Monitoring & Analysis
Command
Deploy SIEM/Proxy hunting queries for network traffic attempting to resolve or pull resources from basemetrika[.]ru.
Command
Monitor web application logs for anomalous spikes in Special:Random requests.
RESPOND (RS) – Mitigation & Containment
Command
Temporarily restrict global editing privileges across affected Wiki projects.
Command
Force session invalidation (logout) for all currently active administrative and standard user accounts.
RECOVER (RC) – Restoration & Trust
Command
Execute database rollbacks to purge malicious modifications to MediaWiki:Common.js and individual user common.js files.
Command
Suppress malicious page revisions from public viewing history.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Implement Content Security Policy (CSP) headers to restrict external script execution to trusted domains only.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Clear all browser cache, cookies, and active session data for any Wikimedia/Wikipedia domains. (Internet disconnection is not required, as the Environmental Reality Check confirms this is not an OS-level infection).
Priority 2: Identity
Command
Log back into your account and verify that your personal User:<username>/common.js file does not contain unauthorized script tags.
Priority 3: Persistence
Command
Check browser extensions for any unauthorized additions, though this specific attack relies on server-side stored scripts rather than local endpoint persistence.
Hardening & References
Baseline
CIS Benchmarks for Web Browsers (Google Chrome / Mozilla Firefox) - specifically enforcing strict site isolation and cookie security.
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
BleepingComputer