Linux Security
Linux Security
Linux Security

A Call to Action: Recent PHP Hack Highlights the Need for Better Security

Date 30 Mar 2021
622
Posted By Brittany Day
LS Hmepg 337x500 32

This weekend’s PHP hack serves as the latest reminder of the importance of server security- and the need to do better.

Just two days ago (Sunday, March 28), hackers were able to breach the internal Git repository of the immensely popular PHP programming language used by almost 80% of all websites on the Internet, and have added a backdoor to the PHP source code. According to a message that the PHP team posted on its mailing list late Sunday night, the malicious code was added to the PHP source code through the accounts of two core PHP team members, Rasmus Lerdorf and Nikita Popov, neither of whom were involved. Popov stated in this message: “We don’t yet know how exactly this happened, but everything points towards a compromise of the git.php.net server.”

Luckily, the backdoor mechanism was first spotted by Michael Voříšek, a Czech-based software engineer, before it made it into production. As a result of this security breach, the PHP team made the collective decision on Monday, March 29, to move source code management operations from its internal Git server to its official GitHub account, which will be PHP’s official Git repository going forward.

Although we are pleased that this backdoor was mitigated before it made it into production, the incident highlights the need for stronger PHP security through the implementation of preventative server security measures and secure server administration. Had this backdoor made it into production, the malicious code would have allowed threat actors to execute their own malicious PHP commands on victims’ servers. On a broader scale, the majority of attacks on PHP servers can be attributed to misconfigurations and poor server administration. In another notable security incident that occurred less than three years ago which has yet to be explained today, hackers compromised the official website of the PHP PEAR extensions system and hosted a backdoored version of the PHP PEAR package manager for nearly six months. 

This string of PHP hacks should serve as a collective call to action for the open-source community to hold open-source projects accountable for the security of their source code and their servers to prevent future vulnerabilities and hacks. And it is not only core team members who are responsible. Users should be contributing to the security of the projects they benefit from, whether it be by reviewing source code, making a donation or helping others get involved. The security of open-source projects is highly dependent upon community involvement, and regardless of your education, experience or skill set, there is something you can do to contribute to the security of Open Source. Right now, attackers are running the show. It’s time to come together as a community and level up!

What are your thoughts on this weekend’s hack? Need guidance on how you can get involved in improving PHP security? Let’s chat!

Connect with us on social media:

Twitter | Facebook

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"47","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.86,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.47,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.