Imunify Operations Team Eliminates Wordpress Malicious Plugin

We’d like to share with you what our Operations Team saw, so you know more about how malicious plugins work, and how you can avoid them. Additionally, read our website hosting security article and learn how to keep your website secure in 2021.
A Critical Security Issue: The SaltStack Salt Authorization Bypass

This week, the Imunify360 security team was informed of a new kind of attack, one that our customers told us caused these problems:
- Inoperable firewall
- High CPU resource consumption
- Log entries such as: im360.plugins.client360: Cannot connect the Server (imunify360.cloudlinux.com) [[Errno -2] Name or service not known]
When we investigated, we saw that these issues were caused by a SaltStack authorization bypass vulnerability (CVE References: CVE-2020-11651, CVE-2020-11652). This vulnerability enables remote command execution as root, on both the master and all minions that connect to it. It affects SaltStack Salt before 2019.2.4, and 3000 before 3000.2.
Enabling Real-Time Scanning In Imunify360

If you’re running Imunify360 on your servers, you should enable real-time scanning. Why and how should you do that? Find out below.

6 Layers of Protection







.png?width=115&height=115&name=pci-dss%20(1).png)
