Supply chain
β Supply Chain
VestaCP Third-Party Breach (October 2018)
Primary Source βIncident Details
Vesta control panel servers infected with DDoS malware after supply chain attack. An open-source hosting panel software provider, Vesta Control Panel (VestaCP), has admitted that the company became a victim of a supply chain attack. In an announcement made by VestaCP on its forum, it was revealed that the hacker managed to contaminate the source code of its project with DDoS malware. The malware was capable of recording passwords and can open shells as well as launch DDoS attacks. In the forum post, a team member of the company stated that an already present bug in the API of an earlier version of VestaCP software was exploited by the attacker to infect the server. βOur infrastructure server was hacked. The hackers then changed all installation scripts to log admin password and .β.
Technical Details
- Initial Attack Vector
- Compromise of third-party service provider / vendor relationship
- Vendor / Product
- not disclosed
- Supply Chain Attack
- β Confirmed third-party / vendor compromise
Timeline
- 2018-10-01 Breach occurred
- 2018-10-22 Publicly disclosed