3 months ago

jQuery Official Weblog Hacked — Continue to be Relaxed, Library is basically Risk-free!


The official weblog of jQuery—most well-identified JavaScript library applied by hundreds of thousands of websites—has been hacked by some mysterious hackers, working with the pseudonym “str0ng” in addition to “n3tr1x.”

jQuery’s weblog web page (weblog.jquery.com) runs on WordPress—the globe’s most well-identified written content administration procedure (CMS) applied by hundreds of thousands of internet sites.

Although there is basically no evidence however if the server (code.jquery.com) of which host jQuery file was also compromised, The Hacker Information took a screenshot (as shown over) in addition to can ensure of which the hackers merely posted a simple weblog put up to deface the web page.

The defaced weblog put up URL — http://weblog.jquery.com/2017/10/26/hacked/ (at present taken out).

Due to the fact the over-mentioned weblog put up was posted below the identify of Leah Silber, a core member of jQuery team, the item seems hackers were able to make their put up live by compromising Silber’s account—probably by reusing her password leaked in a earlier data breach.

If not, the hackers could possibly have gained unauthorized accessibility to the web page either by exploiting a (identified or zero-day) vulnerability in WordPress script or the server.

jQuery team has quickly taken out the put up designed by the hackers as shortly as they recognized there was a compromise, despite the fact that so significantly the organisation has not launched any official statement about the incident.

of which is basically not in the beginning when jQuery’s web page has been compromised. In 2014, the principal area (jQuery.com) was reportedly compromised, redirecting the site’s people to a website page hosting an exploit package.

Due to the fact hundreds of thousands of internet sites instantly use jQuery script hosted by jQuery server, present day assault could be even worse if the hackers could possibly have been able to compromised code.jquery.com in an endeavor to substitute the official jQuery file with the malicious 1, placing billions of people of hundreds of thousands of internet sites at risk of malware assaults.

A similar incident took location yesterday, when a hacker managed to substitute official JavaScript file hosted by Coinhive—a well-identified browser-dependent cryptocurrency miner—that has a modified type of which inevitably tricked CPUs of hundreds of thousands of people of countless numbers of internet sites to mine cryptocurrencies for the hacker unknowingly.

Curiously, Coinhive was also hacked by means of password reuse assault, allowing for the attacker to obtain its CloudFlare account in addition to modify DNS options unauthorizedly.

We’ll update you with far more data on the incident. Continue to be tuned!

Article Categories:
Security Hacks

Leave a Comment

Your email address will not be published. Required fields are marked *

2 × four =