Drupalgeddon Attacks Continue on Sites Missing Security Updates (CVE-2018-7600, CVE-2018-7602)

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Recent attacks targeting Drupal instances vulnerable to Drupalgeddon 2 and Drupalgeddon 3 highlight the importance of identifying and patching vulnerable sites.


In March 2018, Drupal published a security advisory, SA-CORE-2018-002 that addressed a critical Remote Code Execution (RCE) vulnerability with a CVE identifier of CVE-2018-7600. Tenable’s Security Response Team published a blog as well.

A few weeks after the publication of this security advisory, researchers at Check Point Software Technologies and Dofinity published “Uncovering Drupalgeddon 2.0,” providing technical details about CVE-2018-7600. The report included enough information that proof-of-concept (PoC) code began to appear on Github.

One month later, Drupal released SA-CORE-2018-004, a security advisory addressing CVE-2018-7602, another RCE vulnerability which became known as Drupalgeddon 3.

After PoC code for Drupalgeddon was released, attackers began leveraging these vulnerabilities in the wild to implant cryptomining scripts on websites (known as “cryptojacking”) as well as deliver backdoors and password stealing and Remote Access Trojan (RAT) malware.

Despite the availability of patches for both Drupalgeddon 2 and Drupalgeddon 3, there are still unpatched Drupal instances which are being targeted by cybercriminals.

Incident details

On November 19, Trustwave and Imperva published two separate blogs detailing recent attacks leveraging the Drupalgeddon 2 vulnerability.

Trustwave blogged about the discovery of a cryptomining script found on the Make-A-Wish international website which was linked to a known Drupalgeddon 2 campaign dating back to May 2018.

Imperva blogged about a campaign from the end of October that leveraged Drupalgeddon 2 and the Dirty COW (CVE-2016-5195) vulnerability to compromise systems in a persistent manner.

Both of these stories highlight ongoing efforts by cybercriminals to identify and target vulnerable Drupal instances and maintain persistence on compromised systems.

Urgently required actions

It is extremely important to identify Drupal instances that remain unpatched and apply the available patches for SA-CORE-2018-002 and SA-CORE-2018-004 immediately.

Identifying affected systems

A list of Nessus plugins to identify assets vulnerable to Drupalgeddon can be found here.

Get more information

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a free 60-day trial of Tenable.io Vulnerability Management.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?