recommended reading


PHP developer site spits out virus

Software vulnerability

During the past few days, visitors to the official website of the programming language might have had their computers hacked. Intruders performed a “watering hole” attack that inserted malicious software through a flaw in the site’s software.

It’s unclear if the attackers struck because of its massive audience or because most of those visitors are developers. Amazon-owned analytics company Alexa ranks as the 228th-most-visited site in the world.

“PHP developers can be valuable targets for attackers because their computers usually contain intellectual property like source code and other sensitive information, including log-in credentials for websites they maintain,” PCWorld reports.  “Many developers are also likely to visit from company-issued computers, and compromising those computers could allow attackers to access corporate networks.”

It also is not clear what exactly the malware does. The only thing researchers at Barracuda Networks could decipher is that it tries to connect to around three dozen different command-and-control servers around the world and successfully establishes communication with four of them.

“Hackers managed to inject malicious JavaScript code into a file on the site called userprefs.js. The code made requests to a third-party website that scanned visitors’ browsers for vulnerable plug-ins and executed exploits that, if successful, installed a piece of malware,” Barracuda scientist Daniel Peck told PCWorld.

The malware might have wriggled into the site through glitches in Adobe Flash Player.  

Barracuda first detected problems the evening of 10/22. was blacklisted early 10/24 by Google Safe Browsing, a service that prevents Web surfers from visiting malicious websites.

The number of users affected likely was limited by the fact that the rogue code was periodically removed by an existing process that restores files to their original state.

ThreatWatch is a regularly updated catalog of data breaches successfully striking every sector of the globe, as reported by journalists, researchers and the victims themselves.


Technology; Web Services


October 25, 2013

reported by


number affected


location of breach




location of perpetrators


date breach occurred

October 2013

date breach detected

October 21, 2013

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.