[<prev] [next>] [day] [month] [year] [list]
Message-ID: <003801cf559e$ffbeecd0$9b7a6fd5@pc>
Date: Fri, 11 Apr 2014 18:57:38 +0300
From: "MustLive" <mustlive@...security.com.ua>
To: <fulldisclosure@...lists.org>
Subject: [FD] The state of infection in Uanet 2013
Hello participants of Mailing List.
Since 2006 I publish security reports about hackers activity in Uanet and
since 2012 I begun publishing reports about web applications at infected web
sites (among all my reports). About which I wrote in WASC Mailing List.
In my publication The state of infection in Uanet 1h 2013
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2013-October/008906.html)
I wrote you about the state of infection in Uanet in the 1st half year of
2013. Now I want to tell you about the state of infection in Uanet in the
second half and totals of 2013
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-April/009018.html).
After publishing the results of hackers activity in Uanet for the second
half of 2013, I have published separate reports concerning state of malware.
Among my reports there are the next:
- Web applications at infected web sites in the second half of 2013
http://websecurity.com.ua/7089/
- Web applications at infected web sites in 2013
http://websecurity.com.ua/7096/
This information can be interesting for you.
Here is summary for the whole 2013 year from my report. The next engines
(which were identified) were used at web sites infected last year:
Joomla - 54
DataLife Engine - 13
WordPress - 13
Drupal - 4
CMS - 3
CNCat - 2
eM&IS-manager - 2
Elite-Board - 2
Gloowi Engine - 2
I-Soft Bizness - 2
ocStore - 2
UGCS CMS - 2
ArtDesign CMS - 1
Artefact St. CMS - 1
Bitrix Site Manager - 1
CMS Danneo - 1
CMS IT-Project - 1
CodeIgniter - 1
Global Vision CMS - 1
MODx - 1
osCommerce - 1
PHP-Fusion - 1
SmallNuke - 1
vBulletin - 1
Vivvo CMS - 1
WebAsyst Shop-Script - 1
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists