![]() But this time it was a little bit different. At 20:06 a fake process was launched by www-data: ![]() I set up a special monitoring for new processes and tonight the trap worked. Last time the hack took me by surprise, this time I was prepared. I already wrote an article this week about the timthumb.php vulnerability which allows hackers to upload and execute files via Wordpress blogs. Published on November 12th 2011 - Listed in Linux PHP Internet Hacks #Themes deepfocus update#Update on the timthumb Wordpress hack - it happened again! ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |