Security Experts:

Connect with us

Hi, what are you looking for?



Attackers Exploit vBulletin Flaw to Hack Servers

Malicious actors have been targeting servers running vulnerable installations of the vBulletin forum software via a security hole patched by the developer earlier this month, Symantec warned on Monday.

Malicious actors have been targeting servers running vulnerable installations of the vBulletin forum software via a security hole patched by the developer earlier this month, Symantec warned on Monday.

According to the security firm, as many as 2,500 daily hack attempts have been observed since November 5. It appears the attackers have been trying to compromise servers by exploiting a serious vulnerability patched by vBulletin on November 2. The flaw, which can be exploited for remote code execution, affects vBulletin 5 Connect, versions 5.1.4 through 5.1.9.

vBulletin released the patch and reset all account passwords shortly after a hacker using the online moniker “Coldzer0” defaced the official vBulletin forum using a zero-day vulnerability. Although it hasn’t been confirmed by vBulletin, the patch released following the hack seems to be designed to fix the zero-day exploited by Coldzer0.

Since the details of the zero-day were made public on several websites, cybercriminals almost immediately started exploiting it in the wild. Symantec says the attackers are first sending out requests designed to identify vulnerable vBulletin installations.

Once a vulnerable server is found, the hackers download a malicious shell script to the compromised machine. This script allows them to steal sensitive information, including system and network details, user credentials, and private keys from a predetermined list of 130 files and folders.

“By compromising the servers for popular online forums, attackers can potentially carry out many more downstream attacks as these systems often have heavy traffic serving many users. Cybercriminals can use these compromised web servers to booby-trap the website, making it deliver malware to unsuspecting users of the site,” Symantec researchers said in a blog post.

“Selling or hiring compromised server access to other criminals is also a common way for cybercriminals to generate revenue. There is also a market for servers that can be commandeered for performing distributed denial-of-service (DDoS) attacks against chosen targets. Servers often have a lot of available bandwidth and are prized by attackers who are interested in launching DDoS attacks, making them a valuable commodity on the underground market,” they added.

Data from Symantec shows that the highest number of exploit attempts, more than 2,500, was recorded on November 7. The number has steadily declined since, less than 500 daily attempts being spotted over the weekend.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...