Santy.e targets all vulnerable PHP scripts - not solely phpBB

Posted on Monday, December 27 2004 @ 22:42 CET by Thomas De Maesschalck
Last weekend a new version of Santy appeared which is even more dangerous. Santy.e doesn't only targets phpBB but it also attacks other PHP scripts that are vulnerable to the file inclusion exploit.

Just like the original Santy the new variant of this worm uses Google to identify websites vulnerable to this exploit.
"This can only be prevented with decent, secure coding," said Kaspersky Labs. "Every site [that uses PHP] is potentially in danger."

Kaspersky noted that it had already received reports of Websites attacked by infected systems, and that some servers have been compromised or dramatically slowed down as their loads climbed under constant probing.

Like earlier Santy variations, Santy.e uses Google to identify exploitable Web pages written in PHP which use the vulnerable functions "include()" and "require()." Santy.e, however, also throws Yahoo's and AOL's search engines into the mix, learning a lesson from the originals, which were stymied when Google blocked their searches.
More info at Information Week

About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.

Loading Comments