Hackers breach Ghost blogging platform to mine cryptocurrency

The popular open-source blogging platform Ghost has suffered a security breach in which hackers attempted to mine cryptocurrency on…

Ghost blogging platform presents itself as “the simple alternative to WordPress.”

The popular open-source blogging platform Ghost has suffered a security breach in which unknown hacker(s) exploited critical vulnerabilities to mine cryptocurrency on the company’s server.

Developed by Ghost Foundation; the platform is based in Singapore and presents itself as “the simple alternative to WordPress.” The impact of this breach can be measured by the fact that the Ghost blogging platform is home to blogs of popular companies including Duck Duck Go, Digitial Ocean, Tinder, Revolut, Mozilla, Airtable, Code Cademy, Cloudflare, OkCupid, Bitpay and TransferWise, etc. 

Breaking: Tokopedia hacked – Login details of 91 million users sold on dark web

It started on May 3, 03:24 BST when the company updated its Status checker page revealing that the platform is suffering a service outage. At 10:15 BST the same day, the company announced that an attacker exploited two vulnerabilities in the server management infrastructure powered by Saltstack software to gain access to Ghost’s infrastructure.

The attack affected both Ghost (Pro) sites and Ghost.org billing services, the company wrote on its Status Check page. Furthermore, the company maintains that so far there is no evidence that personal data of its customers, passwords, or credit card information was compromised.

While detailing the attack, the Ghost platform stated that the hacker(s) exploited two vulnerabilities CVE-2020-11651 and CVE-2020-11652 to mine cryptocurrency on its servers. 

The mining attempt spiked CPUs and quickly overloaded most of our systems, which alerted us to the issue immediately, the company said.

For your information, CVE-2020-11651 was discovered in some versions of SaltStack software allowing hackers to carry out remote attacks without any security authentication. The vulnerability could also be used to retrieve user tokens from the salt-master and/or run arbitrary commands on salt minions.

Bonus: Best legal & free online streaming sites for movies & TV shows 2020 (no signup or payment card required)

On the other hand, CVE-2020-11652 allowed access to some methods that improperly sanitize paths. These methods allowed arbitrary directory access to authenticated users.

Nevertheless, Ghost has now implemented new security measures including firewalls. As a result, its servers have been restored. However, according to the security advisory, StalkStack plans to address the vulnerabilities in its Sodium release set for mid-June 2020.

Did you enjoy reading this article? Do like our page on Facebook and follow us on Twitter.

Total
7
Shares
Related Posts